CVE-2026-31668
Description
In the Linux kernel, the following vulnerability has been resolved:
seg6: separate dst_cache for input and output paths in seg6 lwtunnel
The seg6 lwtunnel uses a single dst_cache per encap route, shared between seg6_input_core() and seg6_output_core(). These two paths can perform the post-encap SID lookup in different routing contexts (e.g., ip rules matching on the ingress interface, or VRF table separation). Whichever path runs first populates the cache, and the other reuses it blindly, bypassing its own lookup.
Fix this by splitting the cache into cache_input and cache_output, so each path maintains its own cached dst independently.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A shared dst_cache in the Linux kernel's seg6 lwtunnel caused incorrect routing for input and output paths, leading to a critical vulnerability (CVSS 9.8).
Vulnerability
Overview
The Linux kernel's seg6 (Segment Routing over IPv6) lightweight tunnel uses a single dst_cache per encap route, shared between the seg6_input_core() and seg6_output_core() functions. These two functions perform the post-encapsulation SID lookup in different routing contexts—for example, when ingress interface-based rules or VRF table separation are in use. Whichever function runs first populates the shared cache, and the other blindly reuses that cached route, bypassing its own context-specific lookup [1]. This design flaw causes incorrect routing decisions, which can be exploited to redirect or mishandle traffic.
Attack
Scenario
An attacker can exploit this vulnerability by sending crafted IPv6 packets that trigger the seg6 lwtunnel processing. No authentication is required, and the attack can be performed over the network. The shared dst_cache leads to the wrong destination cache being used, potentially allowing an attacker to cause packets to be forwarded to an unintended next-hop or processed in the wrong routing domain. This can be particularly critical in environments with multiple routing tables, VRFs, or policy-based routing [2].
Impact
Successful exploitation could lead to a denial-of-service condition, information disclosure (packets reaching an unintended destination), or in certain network configurations, bypass of security policies enforced by routing rules. The CVSS score of 9.8 reflects the critical nature of this vulnerability, as it allows an attacker to disrupt network traffic without privileges [3].
Mitigation
The fix splits the single dst_cache into two separate caches: cache_input and cache_output. Each path now maintains its own independent cached destination entry, ensuring correct routing context for both input and output operations [4]. Patches have been applied to the stable kernel tree, and administrators should update their kernels to the fixed versions as soon as possible.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
10cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 9 more
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=4.10.1,<5.10.253
- cpe:2.3:o:linux:linux_kernel:4.10:-:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
- (no CPE)
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- git.kernel.org/stable/c/17d87d42874f5d6c1a0ccc6d9190dfe82a9a7a6anvdPatch
- git.kernel.org/stable/c/1dec91d3b1cefb82635761b7812154af3ef46449nvdPatch
- git.kernel.org/stable/c/57d0374d14fa667dec6952173b93e7e84486d5c9nvdPatch
- git.kernel.org/stable/c/6305ad032b03d2ea4181b953a66e19a9a6ed053cnvdPatch
- git.kernel.org/stable/c/750569d6987a0ff46317a4b86eb3907e296287bfnvdPatch
- git.kernel.org/stable/c/84d458018b147176b259347103fccb7e93abd2b1nvdPatch
- git.kernel.org/stable/c/c3812651b522fe8437ebb7063b75ddb95b571643nvdPatch
- git.kernel.org/stable/c/fb56de5d99218de49d5d43ef3a99e062ecd0f9a1nvdPatch
News mentions
0No linked articles in our index yet.