VYPR
Critical severity9.8NVD Advisory· Published Apr 24, 2026· Updated Apr 27, 2026

CVE-2026-31668

CVE-2026-31668

Description

In the Linux kernel, the following vulnerability has been resolved:

seg6: separate dst_cache for input and output paths in seg6 lwtunnel

The seg6 lwtunnel uses a single dst_cache per encap route, shared between seg6_input_core() and seg6_output_core(). These two paths can perform the post-encap SID lookup in different routing contexts (e.g., ip rules matching on the ingress interface, or VRF table separation). Whichever path runs first populates the cache, and the other reuses it blindly, bypassing its own lookup.

Fix this by splitting the cache into cache_input and cache_output, so each path maintains its own cached dst independently.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A shared dst_cache in the Linux kernel's seg6 lwtunnel caused incorrect routing for input and output paths, leading to a critical vulnerability (CVSS 9.8).

Vulnerability

Overview

The Linux kernel's seg6 (Segment Routing over IPv6) lightweight tunnel uses a single dst_cache per encap route, shared between the seg6_input_core() and seg6_output_core() functions. These two functions perform the post-encapsulation SID lookup in different routing contexts—for example, when ingress interface-based rules or VRF table separation are in use. Whichever function runs first populates the shared cache, and the other blindly reuses that cached route, bypassing its own context-specific lookup [1]. This design flaw causes incorrect routing decisions, which can be exploited to redirect or mishandle traffic.

Attack

Scenario

An attacker can exploit this vulnerability by sending crafted IPv6 packets that trigger the seg6 lwtunnel processing. No authentication is required, and the attack can be performed over the network. The shared dst_cache leads to the wrong destination cache being used, potentially allowing an attacker to cause packets to be forwarded to an unintended next-hop or processed in the wrong routing domain. This can be particularly critical in environments with multiple routing tables, VRFs, or policy-based routing [2].

Impact

Successful exploitation could lead to a denial-of-service condition, information disclosure (packets reaching an unintended destination), or in certain network configurations, bypass of security policies enforced by routing rules. The CVSS score of 9.8 reflects the critical nature of this vulnerability, as it allows an attacker to disrupt network traffic without privileges [3].

Mitigation

The fix splits the single dst_cache into two separate caches: cache_input and cache_output. Each path now maintains its own independent cached destination entry, ensuring correct routing context for both input and output operations [4]. Patches have been applied to the stable kernel tree, and administrators should update their kernels to the fixed versions as soon as possible.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

10
  • Linux/Kernel10 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 9 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=4.10.1,<5.10.253
    • cpe:2.3:o:linux:linux_kernel:4.10:-:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
    • (no CPE)

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.