PT-2026-35145 · Linux · Linux

Published

2026-04-25

·

Updated

2026-04-25

·

CVE-2026-31685

None

No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
netfilter: ip6t eui64: reject invalid MAC header for all packets
eui64 mt6() derives a modified EUI-64 from the Ethernet source address and compares it with the low 64 bits of the IPv6 source address.
The existing guard only rejects an invalid MAC header when par->fragoff != 0. For packets with par->fragoff == 0, eui64 mt6() can still reach eth hdr(skb) even when the MAC header is not valid.
Fix this by removing the par->fragoff != 0 condition so that packets with an invalid MAC header are rejected before accessing eth hdr(skb).

Related Identifiers

CVE-2026-31685

Affected Products

Linux