๐Ÿ” CVE Alert

CVE-2026-31424

UNKNOWN 0.0

netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP Weiming Shi says: xt_match and xt_target structs registered with NFPROTO_UNSPEC can be loaded by any protocol family through nft_compat. When such a match/target sets .hooks to restrict which hooks it may run on, the bitmask uses NF_INET_* constants. This is only correct for families whose hook layout matches NF_INET_*: IPv4, IPv6, INET, and bridge all share the same five hooks (PRE_ROUTING ... POST_ROUTING). ARP only has three hooks (IN=0, OUT=1, FORWARD=2) with different semantics. Because NF_ARP_OUT == 1 == NF_INET_LOCAL_IN, the .hooks validation silently passes for the wrong reasons, allowing matches to run on ARP chains where the hook assumptions (e.g. state->in being set on input hooks) do not hold. This leads to NULL pointer dereferences; xt_devgroup is one concrete example: Oops: general protection fault, probably for non-canonical address 0xdffffc0000000044: 0000 [#1] SMP KASAN NOPTI KASAN: null-ptr-deref in range [0x0000000000000220-0x0000000000000227] RIP: 0010:devgroup_mt+0xff/0x350 Call Trace: <TASK> nft_match_eval (net/netfilter/nft_compat.c:407) nft_do_chain (net/netfilter/nf_tables_core.c:285) nft_do_chain_arp (net/netfilter/nft_chain_filter.c:61) nf_hook_slow (net/netfilter/core.c:623) arp_xmit (net/ipv4/arp.c:666) </TASK> Kernel panic - not syncing: Fatal exception in interrupt Fix it by restricting arptables to NFPROTO_ARP extensions only. Note that arptables-legacy only supports: - arpt_CLASSIFY - arpt_mangle - arpt_MARK that provide explicit NFPROTO_ARP match/target declarations.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
9291747f118d6404e509747b85ff5f6dfec368d2 < 1cd6313c8644bfebbd813a05da9daa21b09dd68c 9291747f118d6404e509747b85ff5f6dfec368d2 < f00ac65c90ea475719e08d629e2e26c8b4e6999b 9291747f118d6404e509747b85ff5f6dfec368d2 < e7e1b6bcb389c8708003d40613a59ff2496f6b1f 9291747f118d6404e509747b85ff5f6dfec368d2 < dc3e27dd7d76e21106b8f9bbdc31f5da74a89014 9291747f118d6404e509747b85ff5f6dfec368d2 < 3e79374b03bf9a2f282f0eb1d0ac3776f7e0f28a 9291747f118d6404e509747b85ff5f6dfec368d2 < 3d5d488f11776738deab9da336038add95d342d1
Linux / Linux
2.6.39

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/1cd6313c8644bfebbd813a05da9daa21b09dd68c git.kernel.org: https://git.kernel.org/stable/c/f00ac65c90ea475719e08d629e2e26c8b4e6999b git.kernel.org: https://git.kernel.org/stable/c/e7e1b6bcb389c8708003d40613a59ff2496f6b1f git.kernel.org: https://git.kernel.org/stable/c/dc3e27dd7d76e21106b8f9bbdc31f5da74a89014 git.kernel.org: https://git.kernel.org/stable/c/3e79374b03bf9a2f282f0eb1d0ac3776f7e0f28a git.kernel.org: https://git.kernel.org/stable/c/3d5d488f11776738deab9da336038add95d342d1