Lyrie
Critical CVE
CVSS 9.83 sources verified·1 min read
By Lyrie Threat Intelligence·4/27/2026

CRITICAL: CVE-2026-31414 (CVSS 9.8) — multiple products

CVE: CVE-2026-31414

CVSS: 9.8 (3.1) — CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: CRITICAL

Status: Critical advisory

Affected

_See vendor advisory_

Summary

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_conntrack_expect: use expect->helper

Use expect->helper in ctnetlink and /proc to dump the helper name.

Using nfct_help() without holding a reference to the master conntrack

is unsafe.

Use exp->master->helper in ctnetlink path if userspace does not provide

an explicit helper when creating an expectation to retain the existing

behaviour. The ctnetlink expectation path holds the reference on the

master conntrack and nf_conntrack_expect lock and the nfnetlink glue

path refers to the master ct that is attached to the skb.

Verified Sources

References

  • https://git.kernel.org/stable/c/3dfd3f7712b5a800f2ba632179e9b738076a51f0
  • https://git.kernel.org/stable/c/4bd1b3d839172724b33d8d02c5a4ff6a1c775417
  • https://git.kernel.org/stable/c/847cb7fe26c5ce5dce0d1a41fac1ea488b7f1781
  • https://git.kernel.org/stable/c/b53294bff19e56ada2f230ceb8b1ffde61cc3817
  • https://git.kernel.org/stable/c/e7ccaa0a62a8ff2be5d521299ce79390c318d306
  • https://git.kernel.org/stable/c/f01794106042ee27e54af6fdf5b319a2fe3df94d

_Validated by the Lyrie Threat Intelligence Pipeline — 3 independent sources confirmed before publication. No speculation._

Lyrie Verdict

A vulnerability of this severity is exactly what Lyrie's anti-rogue-AI defense is built for: continuous, autonomous monitoring that doesn't wait for human reaction time.

Validated sources

  1. [1]NVD
  2. [2]GitHub Advisory
  3. [3]MITRE