CVE-2026-31752
Linux Kernel ND Option Length Validation Flaw
Publication date: 2026-05-01
Last updated on: 2026-05-01
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's bridge component, specifically in the br_nd_send() function which processes Neighbor Discovery (ND) options.
The function walks through ND options based on lengths provided by the options themselves. However, if an option is malformed, it can cause the parser to read beyond the intended option boundary or incorrectly handle a source Link-Layer Address (LLADDR) option that is too short.
The fix involves validating the lengths of options against the remaining Neighbor Solicitation (NS) option area before advancing the parser, and only reading the source LLADDR when the option is large enough to contain a full Ethernet address.
How can this vulnerability impact me? :
This vulnerability in the Linux kernel's bridge component involves improper validation of Neighbor Discovery (ND) option lengths. A malformed ND option can cause the parser to read beyond the intended option boundaries or process an incorrectly sized source link-layer address. This could potentially lead to unexpected behavior in network packet processing, which might be exploited to cause denial of service or other network-related issues.