CVE-2026-31752

high

Description

In the Linux kernel, the following vulnerability has been resolved: bridge: br_nd_send: validate ND option lengths br_nd_send() walks ND options according to option-provided lengths. A malformed option can make the parser advance beyond the computed option span or use a too-short source LLADDR option payload. Validate option lengths against the remaining NS option area before advancing, and only read source LLADDR when the option is large enough for an Ethernet address.

References

https://git.kernel.org/stable/c/ee02d8991fd7bd86ed6ebd0deb4aab53feb0e43a

https://git.kernel.org/stable/c/e71303a9190496136e240c4f2872b7b0b16027a7

https://git.kernel.org/stable/c/e0bfd6d4dc77ab345b6c65eef0cfe9b2f69085aa

https://git.kernel.org/stable/c/c49b9256bbacb6a135654aebd12e4c0e87166b7c

https://git.kernel.org/stable/c/850837965af15707fd3142c1cf3c5bfaf022299b

https://git.kernel.org/stable/c/837392a38445729c22e03d3abcf33f07763efd85

https://git.kernel.org/stable/c/82a42eceec7c6bdb0e0da94c0542a173b7ea57f2

https://git.kernel.org/stable/c/259466f76f5a2148aff11134e68f4b4c6d52725b

Details

Source: Mitre, NVD

Published: 2026-05-01

Updated: 2026-05-01

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 8.4

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: High