CVE-2026-31685
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/04/2026
Last modified:
27/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
netfilter: ip6t_eui64: reject invalid MAC header for all packets<br />
<br />
`eui64_mt6()` derives a modified EUI-64 from the Ethernet source address<br />
and compares it with the low 64 bits of the IPv6 source address.<br />
<br />
The existing guard only rejects an invalid MAC header when<br />
`par->fragoff != 0`. For packets with `par->fragoff == 0`, `eui64_mt6()`<br />
can still reach `eth_hdr(skb)` even when the MAC header is not valid.<br />
<br />
Fix this by removing the `par->fragoff != 0` condition so that packets<br />
with an invalid MAC header are rejected before accessing `eth_hdr(skb)`.
Impact
Base Score 3.x
9.40
Severity 3.x
CRITICAL
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/288138418bef956f8b295751a4536c60f0e89f4a
- https://git.kernel.org/stable/c/309ae3e9a51a69699ca94eac5fac5688fa562d55
- https://git.kernel.org/stable/c/807d6ee15804df6f01a35c910f09612e858739a6
- https://git.kernel.org/stable/c/9eda5478746ef7dc0e4e537b5a5e4b0ca1027091
- https://git.kernel.org/stable/c/fdce0b3590f724540795b874b4c8850c90e6b0a8



