PT-2026-35134 · Linux · Linux
Published
2026-04-25
·
Updated
2026-04-25
·
CVE-2026-31674
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
netfilter: ip6t rt: reject oversized addrnr in rt mt6 check()
Reject rt match rules whose addrnr exceeds IP6T RT HOPS.
rt mt6() expects addrnr to stay within the bounds of rtinfo->addrs[].
Validate addrnr during rule installation so malformed rules are rejected
before the match logic can use an out-of-range value.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux