PT-2026-35135 · Linux · Linux

Published

2026-04-25

·

Updated

2026-04-25

·

CVE-2026-31675

None

No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
net/sched: sch netem: fix out-of-bounds access in packet corruption
In netem enqueue(), the packet corruption logic uses get random u32 below(skb headlen(skb)) to select an index for modifying skb->data. When an AF PACKET TX RING sends fully non-linear packets over an IPIP tunnel, skb headlen(skb) evaluates to 0.
Passing 0 to get random u32 below() takes the variable-ceil slow path which returns an unconstrained 32-bit random integer. Using this unconstrained value as an offset into skb->data results in an out-of-bounds memory access.
Fix this by verifying skb headlen(skb) is non-zero before attempting to corrupt the linear data area. Fully non-linear packets will silently bypass the corruption logic.

Related Identifiers

CVE-2026-31675

Affected Products

Linux