CVE-2026-31495
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
22/04/2026
Last modified:
22/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
netfilter: ctnetlink: use netlink policy range checks<br />
<br />
Replace manual range and mask validations with netlink policy<br />
annotations in ctnetlink code paths, so that the netlink core rejects<br />
invalid values early and can generate extack errors.<br />
<br />
- CTA_PROTOINFO_TCP_STATE: reject values > TCP_CONNTRACK_SYN_SENT2 at<br />
policy level, removing the manual >= TCP_CONNTRACK_MAX check.<br />
- CTA_PROTOINFO_TCP_WSCALE_ORIGINAL/REPLY: reject values > TCP_MAX_WSCALE<br />
(14). The normal TCP option parsing path already clamps to this value,<br />
but the ctnetlink path accepted 0-255, causing undefined behavior when<br />
used as a u32 shift count.<br />
- CTA_FILTER_ORIG_FLAGS/REPLY_FLAGS: use NLA_POLICY_MASK with<br />
CTA_FILTER_F_ALL, removing the manual mask checks.<br />
- CTA_EXPECT_FLAGS: use NLA_POLICY_MASK with NF_CT_EXPECT_MASK, adding<br />
a new mask define grouping all valid expect flags.<br />
<br />
Extracted from a broader nf-next patch by Florian Westphal, scoped to<br />
ctnetlink for the fixes tree.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2ef71307c86a9f866d6e28f1a0c06e2e9d794474
- https://git.kernel.org/stable/c/435b576cd2faa75154777868f8cbb73bf71644d3
- https://git.kernel.org/stable/c/45c33e79ae705b7af97e3117672b6cd258dd0b1b
- https://git.kernel.org/stable/c/4f7d25f3f0786402ba48ff7d13b6241d77d975f5
- https://git.kernel.org/stable/c/675c913b940488a84effdeeac5a1cfb657b59804
- https://git.kernel.org/stable/c/8f15b5071b4548b0aafc03b366eb45c9c6566704
- https://git.kernel.org/stable/c/c6cb41eaae875501eaaa487b8db6539feb092292
- https://git.kernel.org/stable/c/fcec5ce2d73a41668b24e3f18c803541602a59f6



