CVE-2026-31407
Description
In the Linux kernel, the following vulnerability has been resolved:
netfilter: conntrack: add missing netlink policy validations
Hyunwoo Kim reports out-of-bounds access in sctp and ctnetlink.
These attributes are used by the kernel without any validation. Extend the netlink policies accordingly.
Quoting the reporter: nlattr_to_sctp() assigns the user-supplied CTA_PROTOINFO_SCTP_STATE value directly to ct->proto.sctp.state without checking that it is within the valid range. [..]
and: ... with exp->dir = 100, the access at ct->master->tuplehash[100] reads 5600 bytes past the start of a 320-byte nf_conn object, causing a slab-out-of-bounds read confirmed by UBSAN.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Missing netlink policy validations in Linux kernel netfilter conntrack allow out-of-bounds access via SCTP state and tuple hash direction.
Root
Cause
The Linux kernel's netfilter connection tracking subsystem (conntrack) lacked proper netlink policy validation for certain attributes. Specifically, the nlattr_to_sctp() function directly assigned user-supplied CTA_PROTOINFO_SCTP_STATE to ct->proto.sctp.state without verifying it is within the valid range. Additionally, the exp->dir field (tuple hash direction) was not validated, allowing values such as 100 to be used as an index into ct->master->tuplehash[], leading to out-of-bounds memory access [1].
Exploitation
An attacker with access to netlink sockets can send crafted netlink messages to trigger these vulnerabilities. No special privileges beyond netlink socket access (e.g., CAP_NET_ADMIN) are required, though such access may be restricted in some environments. The attack does not require authentication if netlink is exposed [1].
Impact
Successful exploitation results in a slab-out-of-bounds read, as confirmed by the reporter Hyunwoo Kim. This can lead to information disclosure (reading beyond the intended memory) or a system crash (denial of service). The worst-case scenario may involve kernel memory leakage [1].
Mitigation
Patches have been applied to the Linux kernel stable trees, adding missing netlink policy validations. Users should update their kernels to versions containing the commits referenced in [1]. No workarounds are available; updating is the recommended course of action.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- git.kernel.org/stable/c/0fbae1e74493d5a160a70c51aeba035d8266ea7dnvd
- git.kernel.org/stable/c/67c53c1978cef3c504237275e39c857e2f6af56envd
- git.kernel.org/stable/c/9174d28f3f15d8c4962f5980c0be167633880443nvd
- git.kernel.org/stable/c/c5e918390002edf0cff80a0e7ce1f86f16a9507cnvd
- git.kernel.org/stable/c/f900e1d77ee0ef87bfb5ab3fe60f0b3d8ad5ba05nvd
News mentions
0No linked articles in our index yet.