PT-2026-35135 · Linux · Linux
Published
2026-04-25
·
Updated
2026-04-25
·
CVE-2026-31675
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
net/sched: sch netem: fix out-of-bounds access in packet corruption
In netem enqueue(), the packet corruption logic uses
get random u32 below(skb headlen(skb)) to select an index for
modifying skb->data. When an AF PACKET TX RING sends fully non-linear
packets over an IPIP tunnel, skb headlen(skb) evaluates to 0.
Passing 0 to get random u32 below() takes the variable-ceil slow path
which returns an unconstrained 32-bit random integer. Using this
unconstrained value as an offset into skb->data results in an
out-of-bounds memory access.
Fix this by verifying skb headlen(skb) is non-zero before attempting
to corrupt the linear data area. Fully non-linear packets will silently
bypass the corruption logic.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux