Vulnerability in Linux Kernel Affecting Nested VLAN Header Handling
CVE-2026-31684

Currently unrated

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
25 April 2026

What is CVE-2026-31684?

A vulnerability in the Linux kernel's handling of nested VLAN headers can allow for improper packet validation. The function tcf_csum_act() does not adequately verify that the entire VLAN header is present when processing in-payload VLAN tags. This oversight can lead to excessive memory access beyond the linear area of a socket buffer (skb) when the inner VLAN header is not fully linearized. The fix ensures that necessary checks are in place by requiring proper validation of the skb before attempting to access and pull nested VLAN headers, preventing potential integrity violations in the network packet processing. If the header is not fully available, the packet is discarded through the existing error handling path.

Affected Version(s)

Linux 2ecba2d1e45b24620a7c3df9531895cf68d5dec6

Linux 2ecba2d1e45b24620a7c3df9531895cf68d5dec6

Linux 2ecba2d1e45b24620a7c3df9531895cf68d5dec6 < 3d165d975305cf76ff0b10a3c798fb31e5f5f9a5

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.