CVE-2026-31633 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: April 27, 2026
Linux Kernel - Integer Overflow
Published: April 24, 2026Updated: April 27, 2026Remote Exploitable
Overview
Linux kernel contains an integer overflow caused by improper rounding of token_len in rxgk_verify_response(), letting attackers bypass length checks, exploit requires crafted UDP packet.
Severity & Score
Severity: Critical
CVSS Score: 9.8
Impact
Attackers can bypass length checks, potentially leading to memory corruption or denial of service.
Mitigation
Update to the latest Linux kernel version with the fix for rxgk_verify_response() integer overflow.
References
Related Resources
Details
- CVE ID
- CVE-2026-31633
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- integer_overflow
- Status
- unconfirmed
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H