PT-2026-34987 · Linux · Linux Kernel
Published
2026-04-24
·
Updated
2026-05-20
·
CVE-2026-31635
CVSS v3.1
7.5
High
| Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Name of the Vulnerable Software and Affected Versions
Linux kernel (affected versions not specified)
Description
A memory corruption issue exists in the RxRPC subsystem of the Linux kernel, specifically within the
rxgk module. The function rxgk verify response() contains an inverted check when decoding the auth len variable from a packet, allowing oversized RESPONSE authenticators to be accepted. These are then passed to rxgk decrypt skb(), which may modify shared packet memory without proper copy-on-write validation. This can lead to an impossible length being passed to skb to sgvec(), triggering a kernel bug or memory corruption. This flaw, also known as DirtyDecrypt or DirtyCBC, can be exploited by unprivileged users to achieve arbitrary kernel writes, resulting in a denial of service or local privilege escalation to root access. The issue specifically affects systems with CONFIG RXGK enabled, including distributions such as Fedora, Arch Linux, and openSUSE Tumbleweed.Recommendations
Install the latest kernel updates to resolve the issue.
As a temporary workaround, disable the
CONFIG RXGK configuration to restrict the use of the vulnerable module.Exploit
Fix
LPE
DoS
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Linux Kernel