Lyrie
Critical CVE
CVSS 9.83 sources verified·1 min read
By Lyrie Threat Intelligence·4/27/2026

CRITICAL: CVE-2026-31633 (CVSS 9.8) — multiple products

CVE: CVE-2026-31633

CVSS: 9.8 (3.1) — CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: CRITICAL

Status: Critical advisory

Affected

_See vendor advisory_

Summary

In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix integer overflow in rxgk_verify_response()

In rxgk_verify_response(), there's a potential integer overflow due to

rounding up token_len before checking it, thereby allowing the length check to

be bypassed.

Fix this by checking the unrounded value against len too (len is limited as

the response must fit in a single UDP packet).

Verified Sources

References

  • https://git.kernel.org/stable/c/1f864d9daaf622aeaa774404fd51e7d6a435b046
  • https://git.kernel.org/stable/c/699e52180f4231c257821c037ed5c99d5eb0edb8
  • https://git.kernel.org/stable/c/c1e242beb6b1efc3c286f617e8d940c8fbf2ed41

_Validated by the Lyrie Threat Intelligence Pipeline — 3 independent sources confirmed before publication. No speculation._

Lyrie Verdict

A vulnerability of this severity is exactly what Lyrie's anti-rogue-AI defense is built for: continuous, autonomous monitoring that doesn't wait for human reaction time.

Validated sources

  1. [1]NVD
  2. [2]GitHub Advisory
  3. [3]MITRE