netfilter: conntrack: add missing netlink policy validations
Summary
| CVE | CVE-2026-31407 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-06 08:16:38 UTC |
| Updated | 2026-04-07 13:20:35 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: add missing netlink policy validations Hyunwoo Kim reports out-of-bounds access in sctp and ctnetlink. These attributes are used by the kernel without any validation. Extend the netlink policies accordingly. Quoting the reporter: nlattr_to_sctp() assigns the user-supplied CTA_PROTOINFO_SCTP_STATE value directly to ct->proto.sctp.state without checking that it is within the valid range. [..] and: ... with exp->dir = 100, the access at ct->master->tuplehash[100] reads 5600 bytes past the start of a 320-byte nf_conn object, causing a slab-out-of-bounds read confirmed by UBSAN. |
Risk And Classification
EPSS: 0.000080000 probability, percentile 0.007100000 (date 2026-04-07)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected a258860e01b80e8f554a4ab1a6c95e6042eb8b73 0fbae1e74493d5a160a70c51aeba035d8266ea7d git | Not specified |
| CNA | Linux | Linux | affected a258860e01b80e8f554a4ab1a6c95e6042eb8b73 f900e1d77ee0ef87bfb5ab3fe60f0b3d8ad5ba05 git | Not specified |
| CNA | Linux | Linux | affected 2.6.27 | Not specified |
| CNA | Linux | Linux | unaffected 2.6.27 semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.10 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0-rc5 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/f900e1d77ee0ef87bfb5ab3fe60f0b3d8ad5ba05 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/0fbae1e74493d5a160a70c51aeba035d8266ea7d | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.