CVE-2026-31682
Received Received - Intake
Buffer Overflow in Linux Bridge br_nd_send Causes Memory Corruption

Publication date: 2026-04-25

Last updated on: 2026-04-27

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: bridge: br_nd_send: linearize skb before parsing ND options br_nd_send() parses neighbour discovery options from ns->opt[] and assumes that these options are in the linear part of request. Its callers only guarantee that the ICMPv6 header and target address are available, so the option area can still be non-linear. Parsing ns->opt[] in that case can access data past the linear buffer. Linearize request before option parsing and derive ns from the linear network header.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-25
Last Modified
2026-04-27
Generated
2026-05-07
AI Q&A
2026-04-26
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's bridge networking code, specifically in the function br_nd_send(). This function parses neighbor discovery (ND) options from a network packet. The issue arises because br_nd_send() assumes that the ND options are stored in a linear part of the packet buffer, but in reality, the options may be non-linear. This can cause the function to access data beyond the intended linear buffer area, potentially leading to incorrect behavior or memory access errors.

The fix involves linearizing the packet buffer before parsing the ND options to ensure safe and correct access to the data.


How can this vulnerability impact me? :

This vulnerability can lead to improper handling of network packets in the Linux kernel's bridge code. Accessing data beyond the linear buffer could cause memory corruption, crashes, or potentially allow an attacker to execute arbitrary code or cause denial of service on affected systems.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability has been resolved by ensuring that the Linux kernel linearizes the skb before parsing neighbour discovery options in the br_nd_send() function.

To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart