Vulnerability in Linux Kernel Affecting Nested VLAN Header Handling
CVE-2026-31684
What is CVE-2026-31684?
A vulnerability in the Linux kernel's handling of nested VLAN headers can allow for improper packet validation. The function tcf_csum_act() does not adequately verify that the entire VLAN header is present when processing in-payload VLAN tags. This oversight can lead to excessive memory access beyond the linear area of a socket buffer (skb) when the inner VLAN header is not fully linearized. The fix ensures that necessary checks are in place by requiring proper validation of the skb before attempting to access and pull nested VLAN headers, preventing potential integrity violations in the network packet processing. If the header is not fully available, the packet is discarded through the existing error handling path.
Affected Version(s)
Linux 2ecba2d1e45b24620a7c3df9531895cf68d5dec6
Linux 2ecba2d1e45b24620a7c3df9531895cf68d5dec6
Linux 2ecba2d1e45b24620a7c3df9531895cf68d5dec6 < 3d165d975305cf76ff0b10a3c798fb31e5f5f9a5