VYPR
Critical severity9.8NVD Advisory· Published Apr 24, 2026· Updated Apr 27, 2026

CVE-2026-31659

CVE-2026-31659

Description

In the Linux kernel, the following vulnerability has been resolved:

batman-adv: reject oversized global TT response buffers

batadv_tt_prepare_tvlv_global_data() builds the allocation length for a global TT response in 16-bit temporaries. When a remote originator advertises a large enough global TT, the TT payload length plus the VLAN header offset can exceed 65535 and wrap before kmalloc().

The full-table response path still uses the original TT payload length when it fills tt_change, so the wrapped allocation is too small and batadv_tt_prepare_tvlv_global_data() writes past the end of the heap object before the later packet-size check runs.

Fix this by rejecting TT responses whose TVLV value length cannot fit in the 16-bit TVLV payload length field.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In Linux kernel's batman-adv, integer overflow in global TT response buffer allocation leads to heap out-of-bounds write, fixed by rejecting oversized responses.

CVE-2026-31659 describes a critical vulnerability in the Linux kernel's batman-adv module. The function batadv_tt_prepare_tvlv_global_data() allocates memory for a global translation table (TT) response using 16-bit temporary variables. When a remote originator advertises a sufficiently large global TT, the combined TT payload length and VLAN header offset can overflow 16 bits, wrapping to a small value before kmalloc(). This results in a heap buffer that is too small for the actual data, leading to a heap out-of-bounds write.

An attacker on the same batman-adv mesh network can exploit this by sending a crafted TT response with a large payload length. No authentication is required if the network accepts TT advertisements from any node. The overflow occurs before a later packet-size check, so the attacker can write controlled data past the end of the allocated heap object.

Successful exploitation allows arbitrary code execution in kernel context, potentially leading to full system compromise. The CVSS v3 score of 9.8 reflects the critical severity and remote attack vector.

The fix, introduced in the kernel stable tree, rejects TT responses whose TVLV value length cannot fit in the 16-bit TVLV payload length field. Affected users should apply the stable kernel update containing commits [1], [2], [3], or [4] as appropriate for their kernel version. No workaround is available.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

9
  • Linux/Kernel9 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 8 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=3.13.1,<5.10.253
    • cpe:2.3:o:linux:linux_kernel:3.13:-:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.