Description
In the Linux kernel, the following vulnerability has been resolved: openvswitch: validate MPLS set/set_masked payload length validate_set() accepted OVS_KEY_ATTR_MPLS as variable-sized payload for SET/SET_MASKED actions. In action handling, OVS expects fixed-size MPLS key data (struct ovs_key_mpls). Use the already normalized key_len (masked case included) and reject non-matching MPLS action key sizes. Reject invalid MPLS action payload lengths early.
INFO
Published Date :
2026-04-25T08:46:55.584Z
Last Modified :
2026-04-27T14:04:59.625Z
Source :
Linux
AFFECTED PRODUCTS
The following products are affected by CVE-2026-31679 vulnerability.
| Vendors | Products |
|---|---|
| Linux |
|
| Openvswitch |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-31679.