The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-31633

CVE-2026-31633: Linux Kernel Privilege Escalation Flaw

CVE-2026-31633 is a privilege escalation vulnerability in the Linux Kernel caused by an integer overflow in rxgk_verify_response(). This article covers technical details, affected versions, impact, and mitigation.

Updated: May 14, 2026

CVE-2026-31633 Overview

CVE-2026-31633 is an integer overflow vulnerability in the Linux kernel's rxrpc subsystem, specifically within the rxgk_verify_response() function. The flaw occurs because token_len is rounded up before being validated, which lets an attacker bypass the length check. The vulnerability affects Linux kernel version 6.16 and the 7.0 release candidates (rc1 through rc7). Tracked under [CWE-190] (Integer Overflow or Wraparound), the issue is exploitable remotely over the network without authentication or user interaction.

Critical Impact

A remote, unauthenticated attacker can trigger an integer overflow in the kernel's RxGK authentication response handling, potentially leading to memory corruption with high impact to confidentiality, integrity, and availability.

Affected Products

  • Linux kernel 6.16
  • Linux kernel 7.0-rc1 through 7.0-rc7
  • Distributions shipping the rxrpc module with RxGK support enabled

Discovery Timeline

  • 2026-04-24 - CVE-2026-31633 published to NVD
  • 2026-04-27 - Last updated in NVD database

Technical Details for CVE-2026-31633

Vulnerability Analysis

The vulnerability resides in rxgk_verify_response(), a function in the rxrpc (AF_RXRPC) networking subsystem that validates RxGK authentication responses. RxGK is the GSS-API-based security class used by AFS-style RPC over UDP. During response verification, the code computes token_len and rounds it up to satisfy alignment requirements before comparing it against the available response length. Rounding up an attacker-supplied value before bounds checking allows a crafted value near UINT_MAX to wrap to a small number that passes validation.

Once the check is bypassed, the kernel proceeds to parse a token whose true size exceeds the actual UDP packet contents. This yields out-of-bounds memory access during decode, with potential for kernel memory corruption or information disclosure.

Root Cause

The root cause is an ordering error between sanitization and validation. The unrounded token_len value must also be compared against len, the length of the containing response which is bounded by a single UDP datagram. The upstream fix introduces this additional check so that a value that would overflow on rounding is rejected before any arithmetic is performed.

Attack Vector

An attacker sends a crafted RxRPC response packet to a target host that has the rxrpc module loaded and accepts RxGK-secured connections. No authentication or user interaction is required, and the attack is performed over the network. Because the bug sits in kernel-mode packet processing, successful exploitation operates at ring 0.

No public proof-of-concept code is available. The vulnerability is described in prose form in the upstream commits; see the kernel.org references for the patches.

Detection Methods for CVE-2026-31633

Indicators of Compromise

  • Unexpected kernel oops or panic messages referencing rxgk_verify_response or rxrpc in dmesg and /var/log/kern.log.
  • Unsolicited inbound UDP traffic on port 7001 (the AFS/RxRPC port) to hosts that do not normally expose RxRPC services.
  • Abnormal crashes or restarts of services that link against libafs or kafs on affected kernels.

Detection Strategies

  • Inventory running kernels and flag any system on 6.16 or 7.0-rc1 through 7.0-rc7 that does not include the fix commits 1f864d9d, 699e5218, or c1e242be.
  • Monitor for kernel taint flags and stack traces in the rxrpc call path captured by host telemetry agents.
  • Correlate inbound UDP/7001 traffic with subsequent kernel-level instability across the fleet.

Monitoring Recommendations

  • Forward kernel logs to a centralized SIEM or data lake and alert on BUG:, KASAN:, or general protection fault entries that include rxrpc symbols.
  • Track loaded kernel modules and alert when rxrpc is present on hosts where AFS is not required.
  • Watch network flow records for sources sending malformed or oversized RxRPC response packets.

How to Mitigate CVE-2026-31633

Immediate Actions Required

  • Apply the upstream kernel patches referenced by commits 1f864d9daaf622aeaa774404fd51e7d6a435b046, 699e52180f4231c257821c037ed5c99d5eb0edb8, and c1e242beb6b1efc3c286f617e8d940c8fbf2ed41.
  • Reboot affected systems after patching to load the fixed kernel image.
  • Restrict inbound UDP traffic to the AFS/RxRPC port (7001) at the network perimeter and host firewall.

Patch Information

The fix adds a check of the unrounded token_len against len so a value that overflows on rounding is rejected before bypassing validation. Patches are available in the stable kernel tree:

  • Kernel commit 1f864d9d
  • Kernel commit 699e5218
  • Kernel commit c1e242be

Workarounds

  • Blacklist the rxrpc kernel module on hosts that do not require AFS connectivity using modprobe.d configuration.
  • Block UDP traffic to port 7001 from untrusted sources at network and host firewalls.
  • Limit RxRPC peers to known AFS cells via configuration where the service must remain enabled.
bash
# Configuration example: prevent the rxrpc module from loading
echo 'blacklist rxrpc' | sudo tee /etc/modprobe.d/disable-rxrpc.conf
echo 'install rxrpc /bin/true' | sudo tee -a /etc/modprobe.d/disable-rxrpc.conf
sudo update-initramfs -u

# Host firewall: block inbound RxRPC/AFS traffic
sudo iptables -A INPUT -p udp --dport 7001 -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechLinux Kernel

  • SeverityCRITICAL

  • CVSS Score9.8

  • EPSS Probability0.05%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-190
  • Vendor Resources
  • Kernel Git Commit Changes

  • Kernel Git Commit Changes

  • Kernel Git Commit Changes
  • Related CVEs
  • CVE-2026-43332: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-43344: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-43306: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-43351: Linux Kernel Privilege Escalation Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English