The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-31635

CVE-2026-31635: Linux Kernel Privilege Escalation Flaw

CVE-2026-31635 is a privilege escalation vulnerability in the Linux kernel affecting rxrpc authentication. An inverted length check allows oversized authenticators to trigger system crashes. This article covers technical details, affected versions, impact, and mitigation strategies.

Updated: May 14, 2026

CVE-2026-31635 Overview

CVE-2026-31635 is a Linux kernel vulnerability in the rxrpc subsystem affecting the rxgk (RxRPC GSSAPI Kerberos) authentication path. The function rxgk_verify_response() contains an inverted length check that fails to reject oversized RESPONSE authenticators. Crafted packets propagate through rxgk_decrypt_skb() to skb_to_sgvec(), where an impossible length triggers a BUG_ON(len) kernel assertion. The flaw enables a remote, unauthenticated attacker to crash affected systems over the network.

Critical Impact

Remote, unauthenticated attackers can trigger a kernel BUG_ON via crafted rxrpc RESPONSE packets, causing denial of service on Linux hosts running affected kernel builds.

Affected Products

  • Linux kernel 6.16 (release)
  • Linux kernel 7.0 release candidates rc1 through rc7
  • Linux kernel builds incorporating the rxrpc rxgk authentication path prior to the upstream fix

Discovery Timeline

  • 2026-04-24 - CVE-2026-31635 published to NVD
  • 2026-04-27 - Last updated in NVD database

Technical Details for CVE-2026-31635

Vulnerability Analysis

The vulnerability resides in rxgk_verify_response() within net/rxrpc/rxgk.c. The function decodes auth_len from an incoming RESPONSE packet and is expected to confirm the declared length fits within the remaining packet payload. The comparison operator is inverted, so values exceeding the available bytes pass validation instead of being rejected.

Once accepted, the oversized authenticator reaches rxgk_decrypt_skb() in net/rxrpc/rxgk_common.h. That path invokes skb_to_sgvec() in net/core/skbuff.c, which walks the socket buffer to build a scatter-gather vector. When the requested length exceeds the actual buffer, __skb_to_sgvec() hits BUG_ON(len) at line 5285 and panics the kernel.

The call chain documented in the upstream commit traces from ret_from_fork() through kthread(), worker_thread(), process_one_work(), rxrpc_process_connection(), and into the rxgk handlers. Processing occurs in a workqueue context, so the crash takes down kernel worker threads handling rxrpc connection events.

Root Cause

The root cause is an inverted bounds check on auth_len during RESPONSE packet decoding. The condition that should reject lengths greater than the remaining payload instead accepts them. This is an input validation failure [NVD-CWE-noinfo] that violates the invariant required by downstream skb_to_sgvec() consumers.

Attack Vector

An unauthenticated remote attacker sends a crafted rxrpc RESPONSE packet to a target listening on the rxrpc protocol with rxgk security enabled. The packet declares an authenticator length larger than the remaining payload. Kernel processing in rxrpc_process_connection() reaches the faulty check, accepts the oversized value, and the subsequent decrypt path triggers the BUG_ON. Network-reachable services that use AFS or other rxrpc-based protocols with rxgk are exposed.

No public proof-of-concept exploit code is currently available for this issue. Refer to the upstream kernel fix commit for the corrected boundary check.

Detection Methods for CVE-2026-31635

Indicators of Compromise

  • Kernel panic logs referencing BUG_ON at __skb_to_sgvec() in net/core/skbuff.c:5285
  • Stack traces containing rxgk_verify_response, rxgk_decrypt_skb, and rxrpc_process_connection frames
  • Unexpected reboots or hangs on hosts exposing rxrpc services (commonly AFS file servers and clients)
  • Inbound rxrpc traffic from untrusted sources targeting UDP port 7000 or other configured rxrpc endpoints

Detection Strategies

  • Monitor dmesg and /var/log/kern.log for BUG: entries originating in the rxrpc or skbuff subsystems
  • Compare running kernel versions against the fixed commits listed in the kernel.org stable advisories
  • Inspect network telemetry for malformed rxrpc RESPONSE packets directed at AFS or kafs endpoints
  • Correlate kernel crash dumps captured by kdump with the documented rxgk_verify_response call chain

Monitoring Recommendations

  • Aggregate kernel crash telemetry from production Linux fleets into a centralized logging platform
  • Alert on repeated worker thread crashes tied to rxrpc_process_connection after exposure to external networks
  • Track patch deployment status for the kernel commits referenced in the vendor advisories across all hosts running affected versions

How to Mitigate CVE-2026-31635

Immediate Actions Required

  • Apply the upstream kernel patches referenced in the kernel.org stable tree as soon as distribution updates are available
  • Inventory hosts running Linux kernel 6.16 or 7.0-rc builds and prioritize those exposing rxrpc services
  • Restrict inbound rxrpc traffic to trusted networks using host firewalls or network ACLs until patches are deployed
  • Disable the rxrpc and kafs kernel modules on systems that do not require AFS connectivity

Patch Information

The fix corrects the inverted length comparison in rxgk_verify_response() so that authenticator lengths exceeding the remaining packet payload are rejected before reaching rxgk_decrypt_skb(). Authoritative commits are available at the Kernel Git Commit Update, Kernel Git Commit Fix, and Kernel Git Commit Improvement. Apply the corresponding distribution kernel updates once published.

Workarounds

  • Block UDP port 7000 and any custom rxrpc ports at perimeter and host firewalls for systems that do not require external AFS access
  • Unload the rxrpc module with modprobe -r rxrpc and add it to a modprobe blacklist where AFS is not in use
  • Limit rxgk-authenticated connectivity to trusted management networks via segmentation until the patched kernel is in production

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechLinux Kernel

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.05%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • NVD-CWE-noinfo
  • Vendor Resources
  • Kernel Git Commit Update

  • Kernel Git Commit Fix

  • Kernel Git Commit Improvement
  • Related CVEs
  • CVE-2026-43332: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-43344: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-43306: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-43351: Linux Kernel Privilege Escalation Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English