PT-2026-35145 · Linux · Linux
Published
2026-04-25
·
Updated
2026-04-25
·
CVE-2026-31685
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
netfilter: ip6t eui64: reject invalid MAC header for all packets
eui64 mt6() derives a modified EUI-64 from the Ethernet source address
and compares it with the low 64 bits of the IPv6 source address.The existing guard only rejects an invalid MAC header when
par->fragoff != 0. For packets with par->fragoff == 0, eui64 mt6()
can still reach eth hdr(skb) even when the MAC header is not valid.Fix this by removing the
par->fragoff != 0 condition so that packets
with an invalid MAC header are rejected before accessing eth hdr(skb). Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux