| Name | CVE-2026-31633 |
| Description | In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix integer overflow in rxgk_verify_response() In rxgk_verify_response(), there's a potential integer overflow due to rounding up token_len before checking it, thereby allowing the length check to be bypassed. Fix this by checking the unrounded value against len too (len is limited as the response must fit in a single UDP packet). |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| linux (PTS) | bullseye | 5.10.223-1 | fixed |
| bullseye (security) | 5.10.251-1 | fixed | |
| bookworm | 6.1.159-1 | fixed | |
| bookworm (security) | 6.1.164-1 | fixed | |
| trixie | 6.12.73-1 | fixed | |
| trixie (security) | 6.12.74-2 | fixed | |
| forky | 6.19.13-1 | fixed | |
| sid | 6.19.14-1 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| linux | source | bullseye | (not affected) | |||
| linux | source | bookworm | (not affected) | |||
| linux | source | trixie | (not affected) | |||
| linux | source | (unstable) | 6.19.13-1 |
[trixie] - linux <not-affected> (Vulnerable code not present)
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
https://git.kernel.org/linus/699e52180f4231c257821c037ed5c99d5eb0edb8 (7.0)