Bug 2464093 (CVE-2026-31692) - CVE-2026-31692 kernel: rtnetlink: add missing netlink_ns_capable() check for peer netns
Summary: CVE-2026-31692 kernel: rtnetlink: add missing netlink_ns_capable() check for ...
Keywords:
Status: NEW
Alias: CVE-2026-31692
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-30 12:01 UTC by OSIDB Bzimport
Modified: 2026-05-01 14:45 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-30 12:01:30 UTC
In the Linux kernel, the following vulnerability has been resolved:

rtnetlink: add missing netlink_ns_capable() check for peer netns

rtnl_newlink() lacks a CAP_NET_ADMIN capability check on the peer
network namespace when creating paired devices (veth, vxcan,
netkit). This allows an unprivileged user with a user namespace
to create interfaces in arbitrary network namespaces, including
init_net.

Add a netlink_ns_capable() check for CAP_NET_ADMIN in the peer
namespace before allowing device creation to proceed.


Note You need to log in before you can comment on or make changes to this bug.