CVE-2026-31679
openvswitch: validate MPLS set/set_masked payload length
Description
In the Linux kernel, the following vulnerability has been resolved: openvswitch: validate MPLS set/set_masked payload length validate_set() accepted OVS_KEY_ATTR_MPLS as variable-sized payload for SET/SET_MASKED actions. In action handling, OVS expects fixed-size MPLS key data (struct ovs_key_mpls). Use the already normalized key_len (masked case included) and reject non-matching MPLS action key sizes. Reject invalid MPLS action payload lengths early.
INFO
Published Date :
April 25, 2026, 9:16 a.m.
Last Modified :
April 25, 2026, 9:16 a.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products
The following products are affected by CVE-2026-31679
vulnerability.
Even if cvefeed.io is aware of the exact versions of the
products
that
are
affected, the information is not represented in the table below.
No affected product recoded yet
Solution
- Apply kernel updates to Open vSwitch.
- Ensure MPLS key data matches expected size.
- Reject invalid MPLS action payload lengths.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2026-31679.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2026-31679 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2026-31679
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2026-31679 vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2026-31679 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Apr. 25, 2026
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: openvswitch: validate MPLS set/set_masked payload length validate_set() accepted OVS_KEY_ATTR_MPLS as variable-sized payload for SET/SET_MASKED actions. In action handling, OVS expects fixed-size MPLS key data (struct ovs_key_mpls). Use the already normalized key_len (masked case included) and reject non-matching MPLS action key sizes. Reject invalid MPLS action payload lengths early. Added Reference https://git.kernel.org/stable/c/2ca33b88a79ca42f017ae0f7011280325655438e Added Reference https://git.kernel.org/stable/c/4cae986225f8b8679ad86b924918e7d75a96aa61 Added Reference https://git.kernel.org/stable/c/546b68ac893595877ffbd7751e5c55fd1c43ede6 Added Reference https://git.kernel.org/stable/c/68f32ef0683c8d1c05cd2e4f16818fa63ff59c6f Added Reference https://git.kernel.org/stable/c/8ed7b9930cbc3bc71f868fa79a68700ac88d586a Added Reference https://git.kernel.org/stable/c/98de18d327ef8cbbb704980e359e4872d8c28997 Added Reference https://git.kernel.org/stable/c/bd50c7484c3bb34097571c1334174fb8b7408036 Added Reference https://git.kernel.org/stable/c/c1f97152df8dfb17e855ddf0fc409b7bd13e9700