VYPR
High severity7.5NVD Advisory· Published Apr 13, 2026· Updated Apr 27, 2026

CVE-2026-31417

CVE-2026-31417

Description

In the Linux kernel, the following vulnerability has been resolved:

net/x25: Fix overflow when accumulating packets

Add a check to ensure that x25_sock.fraglen does not overflow.

The fraglen also needs to be resetted when purging fragment_queue in x25_clear_queues().

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A missing overflow check in the Linux kernel's X.25 network protocol can cause a denial of service when accumulating fragmented packets.

Vulnerability

Overview

CVE-2026-31417 is a high-severity vulnerability in the Linux kernel's X.25 network protocol implementation. The root cause is an integer overflow in the x25_sock.fraglen field, which accumulates the length of incoming fragmented packets. Without a proper bounds check, an attacker can cause fraglen to wrap around, leading to unexpected behavior and potential system crashes or memory corruption.

Exploitation

An attacker with network access to a system using the X.25 protocol can send a sequence of specially crafted fragmented packets. The overflow occurs when the cumulative length of fragments exceeds the maximum-sized fragments exceeds the maximum value of the fraglen variable. No authentication is required beyond the ability to send X.25 frames to the target. The vulnerability is triggered during packet reassembly, before any data is delivered to the application layer.

Impact

Successful exploitation results in a denial of service (DoS) condition. The kernel may panic, hang, or corrupt memory, or behave unpredictably, potentially crashing the entire system. The CVSS v3 base score of 7.5 reflects the high availability impact. There is no evidence of remote code execution or privilege escalation from this vulnerability alone.

Mitigation

The fix adds an overflow check before accumulating fraglen and ensures that fraglen is reset when the fragment queue is purged in x25_clear_queues(). Patches have been applied to the stable kernel branches as referenced in the commit history [1][2][3][4]. Users should update their systems to the latest patched kernel version to mitigate this issue.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

1