Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-31424— netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP

EPSS 0.03% · P9
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-31424

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP Weiming Shi says: xt_match and xt_target structs registered with NFPROTO_UNSPEC can be loaded by any protocol family through nft_compat. When such a match/target sets .hooks to restrict which hooks it may run on, the bitmask uses NF_INET_* constants. This is only correct for families whose hook layout matches NF_INET_*: IPv4, IPv6, INET, and bridge all share the same five hooks (PRE_ROUTING ... POST_ROUTING). ARP only has three hooks (IN=0, OUT=1, FORWARD=2) with different semantics. Because NF_ARP_OUT == 1 == NF_INET_LOCAL_IN, the .hooks validation silently passes for the wrong reasons, allowing matches to run on ARP chains where the hook assumptions (e.g. state->in being set on input hooks) do not hold. This leads to NULL pointer dereferences; xt_devgroup is one concrete example: Oops: general protection fault, probably for non-canonical address 0xdffffc0000000044: 0000 [#1] SMP KASAN NOPTI KASAN: null-ptr-deref in range [0x0000000000000220-0x0000000000000227] RIP: 0010:devgroup_mt+0xff/0x350 Call Trace: <TASK> nft_match_eval (net/netfilter/nft_compat.c:407) nft_do_chain (net/netfilter/nf_tables_core.c:285) nft_do_chain_arp (net/netfilter/nft_chain_filter.c:61) nf_hook_slow (net/netfilter/core.c:623) arp_xmit (net/ipv4/arp.c:666) </TASK> Kernel panic - not syncing: Fatal exception in interrupt Fix it by restricting arptables to NFPROTO_ARP extensions only. Note that arptables-legacy only supports: - arpt_CLASSIFY - arpt_mangle - arpt_MARK that provide explicit NFPROTO_ARP match/target declarations.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于xt_check_match/xt_check_target扩展对NFPROTO_ARP的限制不当,可能导致空指针取消引用。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 9291747f118d6404e509747b85ff5f6dfec368d2 ~ 80e3c75f71c3ea1e62fcb032382de13e00a68f8b -
LinuxLinux 2.6.39 -

II. Public POCs for CVE-2026-31424

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-31424

登录查看更多情报信息。

Same Patch Batch · Linux · 2026-04-13 · 15 CVEs total

CVE-2026-314149.8 CRITICALnetfilter: nf_conntrack_expect: use expect->helper
CVE-2026-314197.8 HIGHnet: bonding: fix use-after-free in bond_xmit_broadcast()
CVE-2026-314177.5 HIGHnet/x25: Fix overflow when accumulating packets
CVE-2026-314267.0 HIGHACPI: EC: clean up handlers on probe failure in acpi_ec_setup()
CVE-2026-31428netfilter: nfnetlink_log: fix uninitialized padding leak in NFULA_PAYLOAD
CVE-2026-31427netfilter: nf_conntrack_sip: fix use of uninitialized rtp_addr in process_sdp
CVE-2026-31425rds: ib: reject FRMR registration before IB connection is established
CVE-2026-31423net/sched: sch_hfsc: fix divide-by-zero in rtsc_min()
CVE-2026-31422net/sched: cls_flow: fix NULL pointer dereference on shared blocks
CVE-2026-31420bridge: mrp: reject zero test interval to avoid OOM panic
CVE-2026-31421net/sched: cls_fw: fix NULL pointer dereference on shared blocks
CVE-2026-31418netfilter: ipset: drop logically empty buckets in mtype_del
CVE-2026-31416netfilter: nfnetlink_log: account for netlink header size
CVE-2026-31415ipv6: avoid overflows in ip6_datagram_send_ctl()

IV. Related Vulnerabilities

V. Comments for CVE-2026-31424

No comments yet


Leave a comment