In the Linux kernel, the following vulnerability has been resolved:
netfilter: ip6t_rt: reject oversized addrnr in rt_mt6_check()
Reject rt match rules whose addrnr exceeds IP6T_RT_HOPS.
rt_mt6() expects addrnr to stay within the bounds of rtinfo->addrs[].
Validate addrnr during rule installation so malformed rules are rejected
before the match logic can use an out-of-range value.
CVSS
No CVSS.
References
Configurations
No configuration.
History
25 Apr 2026, 09:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-25 09:16
Updated : 2026-04-25 09:16
NVD link : CVE-2026-31674
Mitre link : CVE-2026-31674
CVE.ORG link : CVE-2026-31674
JSON object : View
Products Affected
No product.
CWE
No CWE.
