PT-2026-35139 · Linux · Linux
Published
2026-04-25
·
Updated
2026-04-25
·
CVE-2026-31679
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
openvswitch: validate MPLS set/set masked payload length
validate set() accepted OVS KEY ATTR MPLS as variable-sized payload for
SET/SET MASKED actions. In action handling, OVS expects fixed-size
MPLS key data (struct ovs key mpls).
Use the already normalized key len (masked case included) and reject
non-matching MPLS action key sizes.
Reject invalid MPLS action payload lengths early.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux