PT-2026-35144 · Linux · Linux
Published
2026-04-25
·
Updated
2026-04-25
·
CVE-2026-31684
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
net: sched: act csum: validate nested VLAN headers
tcf csum act() walks nested VLAN headers directly from skb->data when an
skb still carries in-payload VLAN tags. The current code reads
vlan->h vlan encapsulated proto and then pulls VLAN HLEN bytes without
first ensuring that the full VLAN header is present in the linear area.
If only part of an inner VLAN header is linearized, accessing
h vlan encapsulated proto reads past the linear area, and the following
skb pull(VLAN HLEN) may violate skb invariants.
Fix this by requiring pskb may pull(skb, VLAN HLEN) before accessing and
pulling each nested VLAN header. If the header still is not fully
available, drop the packet through the existing error path.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux