VYPR
High severity7.1NVD Advisory· Published Apr 6, 2026· Updated Apr 27, 2026

CVE-2026-31407

CVE-2026-31407

Description

In the Linux kernel, the following vulnerability has been resolved:

netfilter: conntrack: add missing netlink policy validations

Hyunwoo Kim reports out-of-bounds access in sctp and ctnetlink.

These attributes are used by the kernel without any validation. Extend the netlink policies accordingly.

Quoting the reporter: nlattr_to_sctp() assigns the user-supplied CTA_PROTOINFO_SCTP_STATE value directly to ct->proto.sctp.state without checking that it is within the valid range. [..]

and: ... with exp->dir = 100, the access at ct->master->tuplehash[100] reads 5600 bytes past the start of a 320-byte nf_conn object, causing a slab-out-of-bounds read confirmed by UBSAN.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing netlink policy validations in Linux kernel netfilter conntrack allow out-of-bounds access via SCTP state and tuple hash direction.

Root

Cause

The Linux kernel's netfilter connection tracking subsystem (conntrack) lacked proper netlink policy validation for certain attributes. Specifically, the nlattr_to_sctp() function directly assigned user-supplied CTA_PROTOINFO_SCTP_STATE to ct->proto.sctp.state without verifying it is within the valid range. Additionally, the exp->dir field (tuple hash direction) was not validated, allowing values such as 100 to be used as an index into ct->master->tuplehash[], leading to out-of-bounds memory access [1].

Exploitation

An attacker with access to netlink sockets can send crafted netlink messages to trigger these vulnerabilities. No special privileges beyond netlink socket access (e.g., CAP_NET_ADMIN) are required, though such access may be restricted in some environments. The attack does not require authentication if netlink is exposed [1].

Impact

Successful exploitation results in a slab-out-of-bounds read, as confirmed by the reporter Hyunwoo Kim. This can lead to information disclosure (reading beyond the intended memory) or a system crash (denial of service). The worst-case scenario may involve kernel memory leakage [1].

Mitigation

Patches have been applied to the Linux kernel stable trees, adding missing netlink policy validations. Users should update their kernels to versions containing the commits referenced in [1]. No workarounds are available; updating is the recommended course of action.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.