Home

Description

In the Linux kernel, the following vulnerability has been resolved: seg6: separate dst_cache for input and output paths in seg6 lwtunnel The seg6 lwtunnel uses a single dst_cache per encap route, shared between seg6_input_core() and seg6_output_core(). These two paths can perform the post-encap SID lookup in different routing contexts (e.g., ip rules matching on the ingress interface, or VRF table separation). Whichever path runs first populates the cache, and the other reuses it blindly, bypassing its own lookup. Fix this by splitting the cache into cache_input and cache_output, so each path maintains its own cached dst independently.

PUBLISHED Reserved 2026-03-09 | Published 2026-04-24 | Updated 2026-04-27 | Assigner Linux




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Product status

Default status
unaffected

6c8702c60b88651072460f3f4026c7dfe2521d12 (git) before 1dec91d3b1cefb82635761b7812154af3ef46449
affected

6c8702c60b88651072460f3f4026c7dfe2521d12 (git) before 750569d6987a0ff46317a4b86eb3907e296287bf
affected

6c8702c60b88651072460f3f4026c7dfe2521d12 (git) before 57d0374d14fa667dec6952173b93e7e84486d5c9
affected

6c8702c60b88651072460f3f4026c7dfe2521d12 (git) before 84d458018b147176b259347103fccb7e93abd2b1
affected

6c8702c60b88651072460f3f4026c7dfe2521d12 (git) before 6305ad032b03d2ea4181b953a66e19a9a6ed053c
affected

6c8702c60b88651072460f3f4026c7dfe2521d12 (git) before fb56de5d99218de49d5d43ef3a99e062ecd0f9a1
affected

6c8702c60b88651072460f3f4026c7dfe2521d12 (git) before 17d87d42874f5d6c1a0ccc6d9190dfe82a9a7a6a
affected

6c8702c60b88651072460f3f4026c7dfe2521d12 (git) before c3812651b522fe8437ebb7063b75ddb95b571643
affected

Default status
affected

4.10
affected

Any version before 4.10
unaffected

5.10.253 (semver)
unaffected

5.15.203 (semver)
unaffected

6.1.169 (semver)
unaffected

6.6.135 (semver)
unaffected

6.12.82 (semver)
unaffected

6.18.23 (semver)
unaffected

6.19.13 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/1dec91d3b1cefb82635761b7812154af3ef46449

git.kernel.org/...c/750569d6987a0ff46317a4b86eb3907e296287bf

git.kernel.org/...c/57d0374d14fa667dec6952173b93e7e84486d5c9

git.kernel.org/...c/84d458018b147176b259347103fccb7e93abd2b1

git.kernel.org/...c/6305ad032b03d2ea4181b953a66e19a9a6ed053c

git.kernel.org/...c/fb56de5d99218de49d5d43ef3a99e062ecd0f9a1

git.kernel.org/...c/17d87d42874f5d6c1a0ccc6d9190dfe82a9a7a6a

git.kernel.org/...c/c3812651b522fe8437ebb7063b75ddb95b571643

cve.org (CVE-2026-31668)

nvd.nist.gov (CVE-2026-31668)

Download JSON