Bug 2461754 (CVE-2026-31682) - CVE-2026-31682 kernel: bridge: br_nd_send: linearize skb before parsing ND options
Summary: CVE-2026-31682 kernel: bridge: br_nd_send: linearize skb before parsing ND op...
Keywords:
Status: NEW
Alias: CVE-2026-31682
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-25 09:01 UTC by OSIDB Bzimport
Modified: 2026-04-27 10:02 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-25 09:01:23 UTC
In the Linux kernel, the following vulnerability has been resolved:

bridge: br_nd_send: linearize skb before parsing ND options

br_nd_send() parses neighbour discovery options from ns->opt[] and
assumes that these options are in the linear part of request.

Its callers only guarantee that the ICMPv6 header and target address
are available, so the option area can still be non-linear. Parsing
ns->opt[] in that case can access data past the linear buffer.

Linearize request before option parsing and derive ns from the linear
network header.


Note You need to log in before you can comment on or make changes to this bug.