The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-31700

CVE-2026-31700: Linux Kernel Race Condition Vulnerability

CVE-2026-31700 is a race condition vulnerability in the Linux Kernel's packet handling that allows userspace to bypass security checks. This article covers the technical details, affected versions, and mitigation strategies.

Published: May 7, 2026

CVE-2026-31700 Overview

CVE-2026-31700 is a Time-of-Check Time-of-Use (TOCTOU) race condition in the Linux kernel's net/packet subsystem. The flaw resides in tpacket_snd() when PACKET_VNET_HDR is enabled. The kernel reads vnet_hdr directly from an mmap'd TX ring buffer shared with userspace, validates it via __packet_snd_vnet_parse(), and then re-reads the same fields later in virtio_net_hdr_to_skb(). A concurrent userspace thread can modify the vnet_hdr between validation and use, bypassing kernel safety checks. This issue is classified under [CWE-362] (Concurrent Execution using Shared Resource with Improper Synchronization).

Critical Impact

A local attacker with AF_PACKET socket access can bypass header validation, leading to memory corruption and full compromise of confidentiality, integrity, and availability.

Affected Products

  • Linux Kernel (multiple stable branches prior to fix)
  • Linux Kernel 7.1-rc1
  • Linux Kernel 7.1-rc2

Discovery Timeline

  • 2026-05-01 - CVE-2026-31700 published to NVD
  • 2026-05-06 - Last updated in NVD database

Technical Details for CVE-2026-31700

Vulnerability Analysis

The vulnerability exists in the TPACKET TX path of the Linux kernel's packet socket implementation. When a process creates an AF_PACKET socket with PACKET_VNET_HDR enabled and uses the TPACKET ring buffer for transmission, the kernel maps a region of memory shared between userspace and the kernel. The vnet_hdr structure resides within this shared mmap'd region.

In tpacket_snd(), the kernel obtains a pointer to vnet_hdr that references the shared memory directly rather than copying the structure to a kernel-controlled buffer. The validation routine __packet_snd_vnet_parse() reads and checks fields such as flags, GSO type, and header lengths. After validation passes, control flows to virtio_net_hdr_to_skb(), which re-reads the same fields from the same shared memory location.

Between these two reads, a second userspace thread can mutate the header values. This breaks the assumption that validated data remains constant during use. The non-TPACKET path in packet_snd() and other consumers in tun.c, tap.c, and virtio_net.c already copy vnet_hdr to a stack-local variable, making the TPACKET TX path the sole offender.

Root Cause

The root cause is a double-fetch pattern across a trust boundary. The kernel treats the mmap'd ring buffer as stable input during validation, but userspace retains write access to that memory throughout the system call. The absence of a defensive copy creates the TOCTOU window.

Attack Vector

Exploitation requires local access and the ability to open an AF_PACKET socket, which typically requires CAP_NET_RAW. An attacker uses two threads: one issues sendmsg() calls through the TPACKET ring while the second continuously rewrites the vnet_hdr fields in the shared mmap region. Winning the race allows the attacker to pass validation with benign values and then deliver malicious values such as inconsistent GSO sizes or header offsets to virtio_net_hdr_to_skb(), leading to skb metadata corruption and potential kernel memory disclosure or privilege escalation.

No public proof-of-concept code is available. Refer to the upstream commits in the kernel.org stable tree for the corrective patch.

Detection Methods for CVE-2026-31700

Indicators of Compromise

  • Unexpected kernel oops or panic messages referencing tpacket_snd, virtio_net_hdr_to_skb, or __packet_snd_vnet_parse in dmesg and /var/log/kern.log.
  • Unprivileged or service accounts creating AF_PACKET sockets with PACKET_VNET_HDR enabled when not expected by the workload baseline.
  • Multi-threaded processes mapping packet ring buffers with PACKET_TX_RING and performing rapid writes from a non-sending thread.

Detection Strategies

  • Audit the use of the socket(AF_PACKET, ...) system call combined with setsockopt for PACKET_VNET_HDR and PACKET_TX_RING using auditd rules.
  • Monitor for processes holding CAP_NET_RAW that spawn additional threads writing to mmap'd packet ring regions.
  • Correlate kernel crash signatures within the packet subsystem against process ancestry to identify exploitation attempts.

Monitoring Recommendations

  • Enable Linux audit rules covering socket, setsockopt, and mmap syscalls and forward events to a centralized log platform for correlation.
  • Track processes that hold CAP_NET_RAW outside of expected daemons such as tcpdump, dhclient, or container networking components.
  • Alert on kernel ring-buffer messages containing packet: warnings or skb validation failures during packet transmission.

How to Mitigate CVE-2026-31700

Immediate Actions Required

  • Apply the upstream Linux kernel patches referenced in the stable tree as soon as vendor builds are available for your distribution.
  • Inventory hosts where untrusted local users or container workloads have CAP_NET_RAW and prioritize patching those systems first.
  • Restrict access to AF_PACKET sockets in container environments by dropping CAP_NET_RAW from default capability sets.

Patch Information

The Linux kernel maintainers have released fixes across multiple stable branches. The patch copies vnet_hdr from the mmap'd ring buffer into a stack-local variable before validation and use, matching the safe pattern already present in packet_snd(). Reference commits include 28324a3b62d9, 2c054e17d9d4, 3a1bf9116ea3, 48a6ef291a17, and 74e2db36fe50 available at git.kernel.org.

Workarounds

  • Remove CAP_NET_RAW from non-essential users, services, and container runtimes to block creation of AF_PACKET sockets.
  • Apply seccomp filters that deny the socket syscall with AF_PACKET for workloads that do not require raw packet access.
  • Use Linux Security Modules such as SELinux or AppArmor to confine processes that must retain packet socket capabilities.
bash
# Drop CAP_NET_RAW from a systemd service unit
[Service]
CapabilityBoundingSet=~CAP_NET_RAW
AmbientCapabilities=
NoNewPrivileges=yes

# Verify capabilities at runtime
getpcaps $(pidof my-service)

# Example seccomp filter snippet (Docker)
docker run --cap-drop=NET_RAW --security-opt seccomp=default.json my-image

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRace Condition

  • Vendor/TechLinux Kernel

  • SeverityHIGH

  • CVSS Score7.8

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-362
  • Vendor Resources
  • Kernel Patch Update

  • Kernel Patch Update

  • Kernel Patch Update

  • Kernel Patch Update

  • Kernel Patch Update
  • Related CVEs
  • CVE-2026-31740: Linux Kernel Race Condition Vulnerability

  • CVE-2026-31751: Linux Kernel Race Condition Vulnerability

  • CVE-2026-31726: Linux Kernel Race Condition Vulnerability

  • CVE-2026-43091: Linux Kernel Race Condition Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English