Cyber Posture

CVE-2026-31641

High

Published: 24 April 2026

Published
24 April 2026
Modified
27 April 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 2.2th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-31641 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Linux Linux Kernel. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 2.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the CVE by requiring timely identification, reporting, and application of kernel patches that fix the bounds checking, allocation sizing, and TOCTOU issues in RxRPC token parsing.

prevent

Ensures validation of raw key and ticket lengths from XDR tokens before rounding and allocation, preventing the heap buffer overflow from oversized inputs via add_key().

prevent

Implements memory safeguards such as randomization and protections against unauthorized access to mitigate exploitation of the heap buffer overflow even if input validation fails.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local heap buffer overflow in kernel RxRPC/add_key path directly enables exploitation for privilege escalation to achieve kernel code execution and root access.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix RxGK token loading to check bounds rxrpc_preparse_xdr_yfs_rxgk() reads the raw key length and ticket length from the XDR token as u32 values and passes each through round_up(x, 4)…

more

before using the rounded value for validation and allocation. When the raw length is >= 0xfffffffd, round_up() wraps to 0, so the bounds check and kzalloc both use 0 while the subsequent memcpy still copies the original ~4 GiB value, producing a heap buffer overflow reachable from an unprivileged add_key() call. Fix this by: (1) Rejecting raw key lengths above AFSTOKEN_GK_KEY_MAX and raw ticket lengths above AFSTOKEN_GK_TOKEN_MAX before rounding, consistent with the caps that the RxKAD path already enforces via AFSTOKEN_RK_TIX_MAX. (2) Sizing the flexible-array allocation from the validated raw key length via struct_size_t() instead of the rounded value. (3) Caching the raw lengths so that the later field assignments and memcpy calls do not re-read from the token, eliminating a class of TOCTOU re-parse. The control path (valid token with lengths within bounds) is unaffected.

Deeper analysisAI

CVE-2026-31641 is a heap buffer overflow vulnerability in the Linux kernel's RxRPC implementation, specifically in the rxrpc_preparse_xdr_yfs_rxgk() function used for RxGK token loading. The issue arises when parsing XDR tokens: raw key and ticket lengths are read as u32 values and passed through round_up(x, 4) for validation and allocation. If a raw length is >= 0xfffffffd, round_up() wraps around to 0, causing the bounds check and kzalloc to use a zero size while the subsequent memcpy copies the original approximately 4 GiB value, resulting in the overflow. This affects Linux kernel versions prior to the application of the referenced stable patches.

The vulnerability is exploitable by a local unprivileged attacker via an add_key() system call, requiring low privileges (PR:L), low attack complexity (AC:L), and no user interaction (UI:N) in a local context (AV:L) with no scope change (S:U). Successful exploitation can lead to high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), with a CVSS v3.1 base score of 7.8. The control path for valid tokens with lengths within bounds remains unaffected.

Mitigation involves applying the upstream kernel patches from the provided stable commit references: https://git.kernel.org/stable/c/3e04596cba8a86cbff9c3f4bf0a524a3a488773c, https://git.kernel.org/stable/c/49875b360c2b83a3c226e189c502e501d83e6445, and https://git.kernel.org/stable/c/d179a868dd755b0cfcf7582e00943d702b9943b8. These fixes reject raw key lengths above AFSTOKEN_GK_KEY_MAX and ticket lengths above AFSTOKEN_GK_TOKEN_MAX before rounding, size flexible-array allocations using struct_size_t() based on validated raw lengths, and cache raw lengths to prevent time-of-check-to-time-of-use (TOCTOU) issues during later memcpy operations. The vulnerability is associated with CWE-125.

Details

CWE(s)

Affected Products

linux
linux kernel
6.16, 7.0 · 6.16.1 — 6.18.23 · 6.19 — 6.19.13

CVEs Like This One

CVE-2026-23099Same product: Linux Linux Kernel
CVE-2026-23407Same product: Linux Linux Kernel
CVE-2025-71112Same product: Linux Linux Kernel
CVE-2026-43025Same product: Linux Linux Kernel
CVE-2026-31675Same product: Linux Linux Kernel
CVE-2026-43048Same product: Linux Linux Kernel
CVE-2026-31570Same product: Linux Linux Kernel
CVE-2026-23406Same product: Linux Linux Kernel
CVE-2024-57998Same product: Linux Linux Kernel
CVE-2026-31558Same product: Linux Linux Kernel

References