CVE-2026-31407
Out-of-Bounds Read in Linux Kernel Netfilter Conntrack Component
Publication date: 2026-04-06
Last updated on: 2026-04-27
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's netfilter conntrack component, where certain netlink attributes are used without proper validation.
Specifically, the function nlattr_to_sctp() assigns a user-supplied value (CTA_PROTOINFO_SCTP_STATE) directly to an internal state variable without checking if the value is within a valid range.
This lack of validation can lead to out-of-bounds memory access, such as reading beyond the allocated memory of a connection tracking object, which can cause a slab-out-of-bounds read error.
How can this vulnerability impact me? :
The vulnerability can lead to out-of-bounds memory reads in the kernel, which may cause system instability or crashes.
Such memory access issues could potentially be exploited by an attacker to gain unauthorized information or cause denial of service by crashing the system.