Description
In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_conntrack_expect: skip expectations in other netns via proc

Skip expectations that do not reside in this netns.

Similar to e77e6ff502ea ("netfilter: conntrack: do not dump other netns's
conntrack entries via proc").
Published: 2026-04-22
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure via /proc of other network namespaces
Action: Update Kernel
AI Analysis

Impact

The nf_conntrack_expect subsystem in the Linux kernel has a logic flaw that allows any process with read access to the /proc filesystem to enumerate expectations that belong to another network namespace. This results in the exposure of state about cross-namespace connections, revealing sensitive traffic patterns and potentially allowing an attacker to infer the presence of devices or services in another namespace. The vulnerability is a moderate-severity kernel data-exposure flaw with a CVSS score of 5.5.

Affected Systems

The flaw is present in the Linux kernel’s nf_conntrack_expect component across many releases, as indicated by the CPE strings covering all modern kernel versions including 2.6.28 and the 7.0 release candidates. Any Linux system running a kernel that includes this module and has /proc exposed to local users is at risk. The CNA indicates the vendor as Linux:Linux, implying all distributions that ship the default kernel are affected unless the kernel is patched or the module is disabled.

Risk and Exploitability

The EPSS score is reported as less than 1% and the vulnerability is not listed in the CISA KEV catalog, suggesting low exploitation activity. The attack vector is local – an adversary must be able to read /proc entries, which typically requires the same privileges as the kernel process or a user granted read access to /proc. The CVSS base score of 5.5 reflects the moderate impact with limited scope. No remote or privilege-escalation vector is documented; the flaw is strictly an information-disclosure problem with local read access as the prerequisite.

Generated by OpenCVE AI on April 29, 2026 at 00:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Linux kernel update that contains the nf_conntrack_expect patch
  • If a kernel update cannot be applied immediately, unload the nf_conntrack_expect module so that its /proc entries are no longer exposed
  • Limit read access to the /proc netfilter directory by ensuring that only privileged or trusted users can read the files and by tightening policies that govern network-namespace administration

Generated by OpenCVE AI on April 29, 2026 at 00:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4561-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6238-1 linux security update
Debian DSA Debian DSA DSA-6243-1 linux security update
History

Tue, 28 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
CWE-284

Tue, 28 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:linux:linux_kernel:2.6.28:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

Mon, 27 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
CWE-284

Thu, 23 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-653
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Wed, 22 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_expect: skip expectations in other netns via proc Skip expectations that do not reside in this netns. Similar to e77e6ff502ea ("netfilter: conntrack: do not dump other netns's conntrack entries via proc").
Title netfilter: nf_conntrack_expect: skip expectations in other netns via proc
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:09:51.412Z

Reserved: 2026-03-09T15:48:24.102Z

Link: CVE-2026-31496

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-22T14:16:47.693

Modified: 2026-04-28T14:43:22.817

Link: CVE-2026-31496

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-22T00:00:00Z

Links: CVE-2026-31496 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T00:15:43Z

Weaknesses