CVE-2026-31495
Netlink Policy Bypass in Linux ctnetlink Causes Undefined Behavior
Publication date: 2026-04-22
Last updated on: 2026-04-28
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 2.6.22 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | From 5.11 (inc) to 5.15.203 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.168 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.18.21 (exc) |
| linux | linux_kernel | From 6.19 (inc) to 6.19.11 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.131 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.80 (exc) |
| linux | linux_kernel | From 2.6.22.1 (inc) to 5.10.253 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's netfilter ctnetlink component involves improper validation of certain netlink attributes. Previously, manual range and mask checks were used, which allowed invalid values to pass through, potentially causing undefined behavior. The fix replaces these manual checks with netlink policy range checks that reject invalid values early and generate error acknowledgments.
- Invalid TCP state values greater than TCP_CONNTRACK_SYN_SENT2 are now rejected at the policy level.
- TCP window scale values greater than 14 are rejected, preventing undefined behavior caused by out-of-range shift counts.
- Flags related to connection tracking filters and expectations now use proper mask policies instead of manual checks.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow invalid or out-of-range values to be processed by the netfilter ctnetlink code paths, potentially leading to undefined behavior in the kernel. This could cause system instability, crashes, or unexpected behavior in network connection tracking, which might be leveraged for denial of service or other attacks.