In the Linux kernel, the following vulnerability has been resolved:
net/x25: Fix overflow when accumulating packets
Add a check to ensure that `x25_sock.fraglen` does not overflow.
The `fraglen` also needs to be resetted when purging `fragment_queue` in
`x25_clear_queues()`.
CVE-2026-31417
NONE
EPSS 0.03%
Updated Apr 18, 2026
Linux
https://git.kernel.org/stable/c/1734bd85c5e0a7a801295b729efb56b009cb8fc3
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/stable/c/4e2d1bcef78d21247fe8fef13bc7ed95885df2b5
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/stable/c/6e568835ea54a3e1d08e310e34f95d434e739477
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/stable/c/798d613afb64b01a203f448fb0f43c37c6afe79d
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/stable/c/8c92969c197b91c134be27dc3afb64ab468853a9
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/stable/c/96fc16370b0bceb289c7e0479bd0540b81e257aa
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/stable/c/a1822cb524e89b4cd2cf0b82e484a2335496a6d9
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/stable/c/f953f11ccf4afe6feb635c08145f4240d9a6b544
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVE Details
CVE ID
CVE-2026-31417
Published Date
Apr 13, 2026
Vendor
Linux
Severity
NONE
Exploit Prediction (EPSS)
Probability of Exploit
0.03%
Likelihood of exploitation in next 30 days
Percentile:
9.3th percentile (higher than 9.3% of all CVEs)
Standard patching cycle
Impact
Minimal impact
Source
View Advisory