MPLS Payload Length Validation Vulnerability in Linux Kernel by Open vSwitch
CVE-2026-31679
What is CVE-2026-31679?
A vulnerability in the Linux kernel affecting Open vSwitch allows for improper validation of MPLS payload lengths in SET and SET_MASKED actions. The validate_set() function mistakenly accepts variable-sized MPLS payloads, which can lead to unexpected behaviors during action handling. The kernel expects fixed-size MPLS key data, and failure to validate this can compromise network integrity. To address this issue, the kernel has been updated to reject non-matching MPLS action key sizes early, enhancing operational security and mitigating potential exploits.
Affected Version(s)
Linux fbdcdd78da7c95f1b970d371e1b23cbd3aa990f3 < 68f32ef0683c8d1c05cd2e4f16818fa63ff59c6f
Linux fbdcdd78da7c95f1b970d371e1b23cbd3aa990f3 < 4cae986225f8b8679ad86b924918e7d75a96aa61
Linux fbdcdd78da7c95f1b970d371e1b23cbd3aa990f3 < 8ed7b9930cbc3bc71f868fa79a68700ac88d586a