Description
In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix buffer overread in rxgk_do_verify_authenticator()

Fix rxgk_do_verify_authenticator() to check the buffer size before checking
the nonce.
Published: 2026-04-24
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Buffer overread in rxrpc authentication may lead to information disclosure or kernel crash, impacting confidentiality and availability.
Action: Patch immediately
AI Analysis

Impact

In the Linux kernel’s rxrpc subsystem, the function rxgk_do_verify_authenticator performs authentication checks on received packets. A missing buffer size validation before accessing the nonce leads to a buffer overread, which may allow an attacker to read unintended kernel memory or cause a kernel crash. This vulnerability is a buffer overread (CWE‑787) and also involves improper bounds checking (CWE‑805), potentially exposing sensitive data or disrupting system availability. The likely attack vector is through crafted rxrpc packets sent over the network to the target system.

Affected Systems

The flaw affects the Linux kernel across multiple release lines, including v6.16 and all 7.0 release candidates (rc1 through rc7). Systems running any of these kernel versions are susceptible until the patch is applied.

Risk and Exploitability

The CVSS score of 8.2 signifies a high severity, while the EPSS score of less than 1% indicates a low probability of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog, suggesting no confirmed exploits. An attacker would need to send a malicious rxrpc packet to the target, which could be performed remotely over an open network, and would require the target to load the vulnerable kernel. Prompt patching is recommended to mitigate the risk.

Generated by OpenCVE AI on April 28, 2026 at 13:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that incorporates the rxrpc buffer overread fix.
  • If a kernel upgrade is not immediately possible, block or restrict the rxrpc protocol on the network using firewall rules to prevent incoming malformed packets.
  • Monitor system logs for rxrpc-related errors or kernel crashes and ensure that no vulnerable kernel modules remain loaded.

Generated by OpenCVE AI on April 28, 2026 at 13:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
CPEs cpe:2.3:o:linux:linux_kernel:6.16:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

Mon, 27 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H'}


Sat, 25 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-805
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Fri, 24 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix buffer overread in rxgk_do_verify_authenticator() Fix rxgk_do_verify_authenticator() to check the buffer size before checking the nonce.
Title rxrpc: Fix buffer overread in rxgk_do_verify_authenticator()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:12:33.001Z

Reserved: 2026-03-09T15:48:24.125Z

Link: CVE-2026-31631

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T15:16:42.423

Modified: 2026-04-27T20:30:46.660

Link: CVE-2026-31631

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-24T00:00:00Z

Links: CVE-2026-31631 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T14:00:16Z

Weaknesses