Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-31424— netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP

AI Predicted 5.5 Difficulty: Moderate EPSS 0.03% · P10

Affected Version Matrix 18

VendorProductVersion RangeStatus
LinuxLinux9291747f118d6404e509747b85ff5f6dfec368d2< 80e3c75f71c3ea1e62fcb032382de13e00a68f8baffected
9291747f118d6404e509747b85ff5f6dfec368d2< d9a0af9e43416aa50c0595e15fa01365a1c72c49affected
9291747f118d6404e509747b85ff5f6dfec368d2< 1cd6313c8644bfebbd813a05da9daa21b09dd68caffected
9291747f118d6404e509747b85ff5f6dfec368d2< f00ac65c90ea475719e08d629e2e26c8b4e6999baffected
9291747f118d6404e509747b85ff5f6dfec368d2< e7e1b6bcb389c8708003d40613a59ff2496f6b1faffected
9291747f118d6404e509747b85ff5f6dfec368d2< dc3e27dd7d76e21106b8f9bbdc31f5da74a89014affected
9291747f118d6404e509747b85ff5f6dfec368d2< 3e79374b03bf9a2f282f0eb1d0ac3776f7e0f28aaffected
9291747f118d6404e509747b85ff5f6dfec368d2< 3d5d488f11776738deab9da336038add95d342d1affected
… +10 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-31424

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP Weiming Shi says: xt_match and xt_target structs registered with NFPROTO_UNSPEC can be loaded by any protocol family through nft_compat. When such a match/target sets .hooks to restrict which hooks it may run on, the bitmask uses NF_INET_* constants. This is only correct for families whose hook layout matches NF_INET_*: IPv4, IPv6, INET, and bridge all share the same five hooks (PRE_ROUTING ... POST_ROUTING). ARP only has three hooks (IN=0, OUT=1, FORWARD=2) with different semantics. Because NF_ARP_OUT == 1 == NF_INET_LOCAL_IN, the .hooks validation silently passes for the wrong reasons, allowing matches to run on ARP chains where the hook assumptions (e.g. state->in being set on input hooks) do not hold. This leads to NULL pointer dereferences; xt_devgroup is one concrete example: Oops: general protection fault, probably for non-canonical address 0xdffffc0000000044: 0000 [#1] SMP KASAN NOPTI KASAN: null-ptr-deref in range [0x0000000000000220-0x0000000000000227] RIP: 0010:devgroup_mt+0xff/0x350 Call Trace: <TASK> nft_match_eval (net/netfilter/nft_compat.c:407) nft_do_chain (net/netfilter/nf_tables_core.c:285) nft_do_chain_arp (net/netfilter/nft_chain_filter.c:61) nf_hook_slow (net/netfilter/core.c:623) arp_xmit (net/ipv4/arp.c:666) </TASK> Kernel panic - not syncing: Fatal exception in interrupt Fix it by restricting arptables to NFPROTO_ARP extensions only. Note that arptables-legacy only supports: - arpt_CLASSIFY - arpt_mangle - arpt_MARK that provide explicit NFPROTO_ARP match/target declarations.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于xt_check_match/xt_check_target扩展对NFPROTO_ARP的限制不当,可能导致空指针取消引用。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 9291747f118d6404e509747b85ff5f6dfec368d2 ~ 80e3c75f71c3ea1e62fcb032382de13e00a68f8b -
LinuxLinux 2.6.39 -

II. Public POCs for CVE-2026-31424

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-31424

登录查看更多情报信息。

Same Patch Batch · Linux · 2026-04-13 · 15 CVEs total

CVE-2026-314149.8 CRITICALnetfilter: nf_conntrack_expect: use expect->helper
CVE-2026-314197.8 HIGHnet: bonding: fix use-after-free in bond_xmit_broadcast()
CVE-2026-314177.5 HIGHnet/x25: Fix overflow when accumulating packets
CVE-2026-314267.0 HIGHACPI: EC: clean up handlers on probe failure in acpi_ec_setup()
CVE-2026-31428netfilter: nfnetlink_log: fix uninitialized padding leak in NFULA_PAYLOAD
CVE-2026-31427netfilter: nf_conntrack_sip: fix use of uninitialized rtp_addr in process_sdp
CVE-2026-31425rds: ib: reject FRMR registration before IB connection is established
CVE-2026-31423net/sched: sch_hfsc: fix divide-by-zero in rtsc_min()
CVE-2026-31422net/sched: cls_flow: fix NULL pointer dereference on shared blocks
CVE-2026-31420bridge: mrp: reject zero test interval to avoid OOM panic
CVE-2026-31421net/sched: cls_fw: fix NULL pointer dereference on shared blocks
CVE-2026-31418netfilter: ipset: drop logically empty buckets in mtype_del
CVE-2026-31416netfilter: nfnetlink_log: account for netlink header size
CVE-2026-31415ipv6: avoid overflows in ip6_datagram_send_ctl()

IV. Related Vulnerabilities

V. Comments for CVE-2026-31424

No comments yet


Leave a comment