bridge: br_nd_send: validate ND option lengths
Summary
| CVE | CVE-2026-31752 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-01 15:16:38 UTC |
| Updated | 2026-05-07 19:08:55 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: bridge: br_nd_send: validate ND option lengths br_nd_send() walks ND options according to option-provided lengths. A malformed option can make the parser advance beyond the computed option span or use a too-short source LLADDR option payload. Validate option lengths against the remaining NS option area before advancing, and only read source LLADDR when the option is large enough for an Ethernet address. |
Risk And Classification
Primary CVSS: v3.1 5.5 MEDIUM from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
EPSS: 0.000240000 probability, percentile 0.068060000 (date 2026-05-05)
Problem Types: NVD-CWE-noinfo
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
NoneAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected ed842faeb2bd49256f00485402f3113205f91d30 82a42eceec7c6bdb0e0da94c0542a173b7ea57f2 git | Not specified |
| CNA | Linux | Linux | affected ed842faeb2bd49256f00485402f3113205f91d30 259466f76f5a2148aff11134e68f4b4c6d52725b git | Not specified |
| CNA | Linux | Linux | affected ed842faeb2bd49256f00485402f3113205f91d30 ee02d8991fd7bd86ed6ebd0deb4aab53feb0e43a git | Not specified |
| CNA | Linux | Linux | affected ed842faeb2bd49256f00485402f3113205f91d30 e0bfd6d4dc77ab345b6c65eef0cfe9b2f69085aa git | Not specified |
| CNA | Linux | Linux | affected ed842faeb2bd49256f00485402f3113205f91d30 c49b9256bbacb6a135654aebd12e4c0e87166b7c git | Not specified |
| CNA | Linux | Linux | affected ed842faeb2bd49256f00485402f3113205f91d30 837392a38445729c22e03d3abcf33f07763efd85 git | Not specified |
| CNA | Linux | Linux | affected ed842faeb2bd49256f00485402f3113205f91d30 e71303a9190496136e240c4f2872b7b0b16027a7 git | Not specified |
| CNA | Linux | Linux | affected ed842faeb2bd49256f00485402f3113205f91d30 850837965af15707fd3142c1cf3c5bfaf022299b git | Not specified |
| CNA | Linux | Linux | affected 4.15 | Not specified |
| CNA | Linux | Linux | unaffected 4.15 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.253 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.203 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.168 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.134 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.81 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.22 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.12 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/c49b9256bbacb6a135654aebd12e4c0e87166b7c | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/e71303a9190496136e240c4f2872b7b0b16027a7 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/259466f76f5a2148aff11134e68f4b4c6d52725b | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/e0bfd6d4dc77ab345b6c65eef0cfe9b2f69085aa | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/850837965af15707fd3142c1cf3c5bfaf022299b | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/837392a38445729c22e03d3abcf33f07763efd85 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/ee02d8991fd7bd86ed6ebd0deb4aab53feb0e43a | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/82a42eceec7c6bdb0e0da94c0542a173b7ea57f2 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.