CVE-2026-31738 PUBLISHED

vxlan: validate ND option lengths in vxlan_na_create

Assigner: Linux
Reserved: 09.03.2026 Published: 01.05.2026 Updated: 01.05.2026

In the Linux kernel, the following vulnerability has been resolved:

vxlan: validate ND option lengths in vxlan_na_create

vxlan_na_create() walks ND options according to option-provided lengths. A malformed option can make the parser advance beyond the computed option span or use a too-short source LLADDR option payload.

Validate option lengths against the remaining NS option area before advancing, and only read source LLADDR when the option is large enough for an Ethernet address.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 4b29dba9c085a4fb79058fb1c45a2f6257ca3dfa to 901c1dd3bab2955d7e664f914c374c8c3ac2b958 (excl.)
  • affected from 4b29dba9c085a4fb79058fb1c45a2f6257ca3dfa to e476745917a1e288eb15e7ff49d286a86a4861d3 (excl.)
  • affected from 4b29dba9c085a4fb79058fb1c45a2f6257ca3dfa to 2029712fb2c87e9a8c75094906f2ee29bf08c500 (excl.)
  • affected from 4b29dba9c085a4fb79058fb1c45a2f6257ca3dfa to 602596c69a70e50d9ab8c6ae0290a01f88229dd7 (excl.)
  • affected from 4b29dba9c085a4fb79058fb1c45a2f6257ca3dfa to de20d2e3b9179d132f5f5b44e490d7c916c6321b (excl.)
  • affected from 4b29dba9c085a4fb79058fb1c45a2f6257ca3dfa to eddfce70a6f3107d1679b0c2fcbeb96b593bd679 (excl.)
  • affected from 4b29dba9c085a4fb79058fb1c45a2f6257ca3dfa to b69c4236255bd8de16cd876e58c6f0867d1d78b1 (excl.)
  • affected from 4b29dba9c085a4fb79058fb1c45a2f6257ca3dfa to afa9a05e6c4971bd5586f1b304e14d61fb3d9385 (excl.)
  • Version d8be18c52dbc94989f6d74637b731af39cd3d902 is affected
  • Version 3927dace523706cc00f808520eaf2125dd7c07b5 is affected
Vendor Linux
Product Linux
Versions Default: affected
  • Version 3.14 is affected
  • unaffected from 0 to 3.14 (excl.)
  • unaffected from 5.10.253 to 5.10.* (incl.)
  • unaffected from 5.15.203 to 5.15.* (incl.)
  • unaffected from 6.1.168 to 6.1.* (incl.)
  • unaffected from 6.6.134 to 6.6.* (incl.)
  • unaffected from 6.12.81 to 6.12.* (incl.)
  • unaffected from 6.18.22 to 6.18.* (incl.)
  • unaffected from 6.19.12 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References