CVE-2026-31668
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/04/2026
Última modificación:
24/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
seg6: separate dst_cache for input and output paths in seg6 lwtunnel<br />
<br />
The seg6 lwtunnel uses a single dst_cache per encap route, shared<br />
between seg6_input_core() and seg6_output_core(). These two paths<br />
can perform the post-encap SID lookup in different routing contexts<br />
(e.g., ip rules matching on the ingress interface, or VRF table<br />
separation). Whichever path runs first populates the cache, and the<br />
other reuses it blindly, bypassing its own lookup.<br />
<br />
Fix this by splitting the cache into cache_input and cache_output,<br />
so each path maintains its own cached dst independently.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/17d87d42874f5d6c1a0ccc6d9190dfe82a9a7a6a
- https://git.kernel.org/stable/c/1dec91d3b1cefb82635761b7812154af3ef46449
- https://git.kernel.org/stable/c/57d0374d14fa667dec6952173b93e7e84486d5c9
- https://git.kernel.org/stable/c/6305ad032b03d2ea4181b953a66e19a9a6ed053c
- https://git.kernel.org/stable/c/750569d6987a0ff46317a4b86eb3907e296287bf
- https://git.kernel.org/stable/c/84d458018b147176b259347103fccb7e93abd2b1
- https://git.kernel.org/stable/c/c3812651b522fe8437ebb7063b75ddb95b571643
- https://git.kernel.org/stable/c/fb56de5d99218de49d5d43ef3a99e062ecd0f9a1



