Report: CVE-2026-31679 - openvswitch: validate MPLS set/set_masked payload length
CVE ID :CVE-2026-31679 Published : April 25, 2026, 9:16 a.m. | 1 hour, 11 minutes ago Description :In the Linux kernel, the following vulnerability has been resolved: openvswitch: validate MPLS set/set_masked payload length validate_set() accepted OVS_KEY_ATTR_MPLS as variable-sized payload for SET/SET_MASKED actions. In action handling, OVS expects fixed-size MPLS key data (struct ovs_key_mpls). Use the already normalized key_len (masked case included) and reject non-matching MPLS action key sizes. Reject invalid MPLS action payload lengths early. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...