Home

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: ip6t_eui64: reject invalid MAC header for all packets `eui64_mt6()` derives a modified EUI-64 from the Ethernet source address and compares it with the low 64 bits of the IPv6 source address. The existing guard only rejects an invalid MAC header when `par->fragoff != 0`. For packets with `par->fragoff == 0`, `eui64_mt6()` can still reach `eth_hdr(skb)` even when the MAC header is not valid. Fix this by removing the `par->fragoff != 0` condition so that packets with an invalid MAC header are rejected before accessing `eth_hdr(skb)`.

PUBLISHED Reserved 2026-03-09 | Published 2026-04-25 | Updated 2026-04-27 | Assigner Linux




CRITICAL: 9.4CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 288138418bef956f8b295751a4536c60f0e89f4a
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 9eda5478746ef7dc0e4e537b5a5e4b0ca1027091
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 807d6ee15804df6f01a35c910f09612e858739a6
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 309ae3e9a51a69699ca94eac5fac5688fa562d55
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before fdce0b3590f724540795b874b4c8850c90e6b0a8
affected

Default status
affected

2.6.12
affected

Any version before 2.6.12
unaffected

6.6.136 (semver)
unaffected

6.12.83 (semver)
unaffected

6.18.24 (semver)
unaffected

6.19.14 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/288138418bef956f8b295751a4536c60f0e89f4a

git.kernel.org/...c/9eda5478746ef7dc0e4e537b5a5e4b0ca1027091

git.kernel.org/...c/807d6ee15804df6f01a35c910f09612e858739a6

git.kernel.org/...c/309ae3e9a51a69699ca94eac5fac5688fa562d55

git.kernel.org/...c/fdce0b3590f724540795b874b4c8850c90e6b0a8

cve.org (CVE-2026-31685)

nvd.nist.gov (CVE-2026-31685)

Download JSON