U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2026-31682 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: bridge: br_nd_send: linearize skb before parsing ND options br_nd_send() parses neighbour discovery options from ns->opt[] and assumes that these options are in the linear part of request. Its callers only guarantee that the ICMPv6 header and target address are available, so the option area can still be non-linear. Parsing ns->opt[] in that case can access data past the linear buffer. Linearize request before option parsing and derive ns from the linear network header.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/2ba4caba423ed94d63006eb1d2227b0332ab7fcd kernel.org
https://git.kernel.org/stable/c/3a30f6469b058574f49efde61cd6f5d79e576053 kernel.org
https://git.kernel.org/stable/c/4f397b950c916e9a1f8a4fce04ea0110206cad47 kernel.org
https://git.kernel.org/stable/c/658261898130da620fc3d0fbb0523efb3366cb55 kernel.org
https://git.kernel.org/stable/c/9c55e41c73af5c4511070933b1bd25248521270c kernel.org
https://git.kernel.org/stable/c/a01aee7cafc575bb82f5529e8734e7052f9b16ea kernel.org
https://git.kernel.org/stable/c/bd91ec85aa4c77d645bd2739fc56784157a88ca2 kernel.org
https://git.kernel.org/stable/c/c68433fd291c9e88c00292095172c62d1997d662 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2026-31682
NVD Published Date:
04/25/2026
NVD Last Modified:
04/25/2026
Source:
kernel.org