0.0
NA
CVE-2026-31679
openvswitch: validate MPLS set/set_masked payload length
Description

In the Linux kernel, the following vulnerability has been resolved: openvswitch: validate MPLS set/set_masked payload length validate_set() accepted OVS_KEY_ATTR_MPLS as variable-sized payload for SET/SET_MASKED actions. In action handling, OVS expects fixed-size MPLS key data (struct ovs_key_mpls). Use the already normalized key_len (masked case included) and reject non-matching MPLS action key sizes. Reject invalid MPLS action payload lengths early.

INFO

Published Date :

April 25, 2026, 9:16 a.m.

Last Modified :

April 25, 2026, 9:16 a.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2026-31679 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

No affected product recoded yet

Solution
Validate MPLS payload lengths in Open vSwitch to prevent issues.
  • Apply kernel updates to Open vSwitch.
  • Ensure MPLS key data matches expected size.
  • Reject invalid MPLS action payload lengths.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2026-31679 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2026-31679 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2026-31679 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2026-31679 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Apr. 25, 2026

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: openvswitch: validate MPLS set/set_masked payload length validate_set() accepted OVS_KEY_ATTR_MPLS as variable-sized payload for SET/SET_MASKED actions. In action handling, OVS expects fixed-size MPLS key data (struct ovs_key_mpls). Use the already normalized key_len (masked case included) and reject non-matching MPLS action key sizes. Reject invalid MPLS action payload lengths early.
    Added Reference https://git.kernel.org/stable/c/2ca33b88a79ca42f017ae0f7011280325655438e
    Added Reference https://git.kernel.org/stable/c/4cae986225f8b8679ad86b924918e7d75a96aa61
    Added Reference https://git.kernel.org/stable/c/546b68ac893595877ffbd7751e5c55fd1c43ede6
    Added Reference https://git.kernel.org/stable/c/68f32ef0683c8d1c05cd2e4f16818fa63ff59c6f
    Added Reference https://git.kernel.org/stable/c/8ed7b9930cbc3bc71f868fa79a68700ac88d586a
    Added Reference https://git.kernel.org/stable/c/98de18d327ef8cbbb704980e359e4872d8c28997
    Added Reference https://git.kernel.org/stable/c/bd50c7484c3bb34097571c1334174fb8b7408036
    Added Reference https://git.kernel.org/stable/c/c1f97152df8dfb17e855ddf0fc409b7bd13e9700
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.