Out-of-Bounds Memory Access in Linux Kernel Network Scheduling
CVE-2026-31675
What is CVE-2026-31675?
The Linux kernel is susceptible to an out-of-bounds memory access vulnerability during network scheduling operations. Specifically, when processing packet corruption logic in the 'netem_enqueue()' function, the mechanism for determining an index for modifying the packet data can produce a random value without constraints if the packet length evaluates to zero. This can lead to unauthorized access to memory beyond the allocated boundaries, posing a risk when non-linear packets are transmitted over IPIP tunnels. The vulnerability has been addressed by implementing a check to ensure the packet length is non-zero before executing packet data modifications. As a result, fully non-linear packets will bypass the corruption logic without triggering this issue.
Affected Version(s)
Linux c865e5d99e25a171e8262fc0f7ba608568633c64
Linux c865e5d99e25a171e8262fc0f7ba608568633c64 < 13a66ca1e235d4bcd53d12d4c68490cad7f8e46f
Linux c865e5d99e25a171e8262fc0f7ba608568633c64 < 3a2999704ac36cfb4041fed3652d26a3373e8d12