CVE-2026-31503
UDP Wildcard Bind Conflict Vulnerability in Linux Kernel
Publication date: 2026-04-22
Last updated on: 2026-04-28
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 2.6.33 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.21 (exc) |
| linux | linux_kernel | From 6.19 (inc) to 6.19.11 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.131 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.80 (exc) |
| linux | linux_kernel | From 2.6.33.1 (inc) to 6.1.168 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's UDP socket binding mechanism. When binding a UDP socket to a local address and port, the kernel uses two hash tables (hash and hash2) to detect conflicts. The issue arises because the code switches to using hash2 only after more than 10 sockets are bound to the same port.
Hash is keyed by local port only, while hash2 is keyed by both local address and local port. Due to this, when the count exceeds 10 and hash2 is used, the conflict detection can miss conflicts involving wildcard addresses (like [::]:8888 or 0.0.0.0:8888), allowing multiple sockets to bind to the same port unexpectedly.
This means that under certain conditions, the system incorrectly allows binding to a port that should be reported as already in use, potentially causing unexpected behavior in network applications.
How can this vulnerability impact me? :
This vulnerability can lead to multiple UDP sockets being bound to the same port when they should not be, due to missed conflict detection. This can cause unexpected network behavior, such as data being delivered to the wrong socket or interference between applications.
Such behavior can result in application errors, data corruption, or denial of service conditions where network communication is disrupted or unreliable.