CVE-2026-31407

high

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: add missing netlink policy validations Hyunwoo Kim reports out-of-bounds access in sctp and ctnetlink. These attributes are used by the kernel without any validation. Extend the netlink policies accordingly. Quoting the reporter: nlattr_to_sctp() assigns the user-supplied CTA_PROTOINFO_SCTP_STATE value directly to ct->proto.sctp.state without checking that it is within the valid range. [..] and: ... with exp->dir = 100, the access at ct->master->tuplehash[100] reads 5600 bytes past the start of a 320-byte nf_conn object, causing a slab-out-of-bounds read confirmed by UBSAN.

References

https://git.kernel.org/stable/c/f900e1d77ee0ef87bfb5ab3fe60f0b3d8ad5ba05

https://git.kernel.org/stable/c/c5e918390002edf0cff80a0e7ce1f86f16a9507c

https://git.kernel.org/stable/c/9174d28f3f15d8c4962f5980c0be167633880443

https://git.kernel.org/stable/c/67c53c1978cef3c504237275e39c857e2f6af56e

https://git.kernel.org/stable/c/0fbae1e74493d5a160a70c51aeba035d8266ea7d

Details

Source: Mitre, NVD

Published: 2026-04-06

Updated: 2026-04-27

Risk Information

CVSS v2

Base Score: 6.2

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 7.1

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Severity: High

EPSS

EPSS: 0.00008