{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-31681","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2026-03-09T15:48:24.130Z","datePublished":"2026-04-25T08:46:57.995Z","dateUpdated":"2026-05-11T22:13:34.942Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T22:13:34.942Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: xt_multiport: validate range encoding in checkentry\n\nports_match_v1() treats any non-zero pflags entry as the start of a\nport range and unconditionally consumes the next ports[] element as\nthe range end.\n\nThe checkentry path currently validates protocol, flags and count, but\nit does not validate the range encoding itself. As a result, malformed\nrules can mark the last slot as a range start or place two range starts\nback to back, leaving ports_match_v1() to step past the last valid\nports[] element while interpreting the rule.\n\nReject malformed multiport v1 rules in checkentry by validating that\neach range start has a following element and that the following element\nis not itself marked as another range start."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/netfilter/xt_multiport.c"],"versions":[{"version":"a89ecb6a2ef732d04058d87801e2b6bd7e5c7089","lessThan":"36bf0d98e180a7c384c8d8a59b0d2d4b80e5eb16","status":"affected","versionType":"git"},{"version":"a89ecb6a2ef732d04058d87801e2b6bd7e5c7089","lessThan":"aec14808271f2bf2b656de6ff12dfe73c5fd3b67","status":"affected","versionType":"git"},{"version":"a89ecb6a2ef732d04058d87801e2b6bd7e5c7089","lessThan":"8368ce8eb01f0b91111d814703696e780d0ef12f","status":"affected","versionType":"git"},{"version":"a89ecb6a2ef732d04058d87801e2b6bd7e5c7089","lessThan":"1e4baa853f1cc4227e04f52d6860524707cfb294","status":"affected","versionType":"git"},{"version":"a89ecb6a2ef732d04058d87801e2b6bd7e5c7089","lessThan":"ff64c5bfef12461df8450e0f50bb693b5269c720","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/netfilter/xt_multiport.c"],"versions":[{"version":"2.6.17","status":"affected"},{"version":"0","lessThan":"2.6.17","status":"unaffected","versionType":"semver"},{"version":"6.6.136","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.83","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.18.24","lessThanOrEqual":"6.18.*","status":"unaffected","versionType":"semver"},{"version":"6.19.14","lessThanOrEqual":"6.19.*","status":"unaffected","versionType":"semver"},{"version":"7.0","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.17","versionEndExcluding":"6.6.136"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.17","versionEndExcluding":"6.12.83"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.17","versionEndExcluding":"6.18.24"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.17","versionEndExcluding":"6.19.14"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.17","versionEndExcluding":"7.0"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/36bf0d98e180a7c384c8d8a59b0d2d4b80e5eb16"},{"url":"https://git.kernel.org/stable/c/aec14808271f2bf2b656de6ff12dfe73c5fd3b67"},{"url":"https://git.kernel.org/stable/c/8368ce8eb01f0b91111d814703696e780d0ef12f"},{"url":"https://git.kernel.org/stable/c/1e4baa853f1cc4227e04f52d6860524707cfb294"},{"url":"https://git.kernel.org/stable/c/ff64c5bfef12461df8450e0f50bb693b5269c720"}],"title":"netfilter: xt_multiport: validate range encoding in checkentry","x_generator":{"engine":"bippy-1.2.0"}}}}