In the Linux kernel, the following vulnerability has been resolved: vxlan: validate ND option lengths in vxlan_na_create vxlan_na_create() walks ND options according to option-provided lengths. A malformed option can make the parser advance beyond the computed option span or use a too-short source LLADDR option payload. Validate option lengths against the remaining NS option area before advancing, and only read source LLADDR when the option is large enough for an Ethernet address.
https://git.kernel.org/stable/c/eddfce70a6f3107d1679b0c2fcbeb96b593bd679
https://git.kernel.org/stable/c/e476745917a1e288eb15e7ff49d286a86a4861d3
https://git.kernel.org/stable/c/de20d2e3b9179d132f5f5b44e490d7c916c6321b
https://git.kernel.org/stable/c/b69c4236255bd8de16cd876e58c6f0867d1d78b1
https://git.kernel.org/stable/c/afa9a05e6c4971bd5586f1b304e14d61fb3d9385
https://git.kernel.org/stable/c/901c1dd3bab2955d7e664f914c374c8c3ac2b958
https://git.kernel.org/stable/c/602596c69a70e50d9ab8c6ae0290a01f88229dd7
https://git.kernel.org/stable/c/2029712fb2c87e9a8c75094906f2ee29bf08c500