VYPR
Medium severity5.5NVD Advisory· Published May 1, 2026· Updated May 7, 2026

CVE-2026-31738

CVE-2026-31738

Description

In the Linux kernel, the following vulnerability has been resolved:

vxlan: validate ND option lengths in vxlan_na_create

vxlan_na_create() walks ND options according to option-provided lengths. A malformed option can make the parser advance beyond the computed option span or use a too-short source LLADDR option payload.

Validate option lengths against the remaining NS option area before advancing, and only read source LLADDR when the option is large enough for an Ethernet address.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's VXLAN implementation, missing ND option length validation in vxlan_na_create() allows a malformed packet to cause out-of-bounds read, leading to potential information disclosure.

The vulnerability resides in the Linux kernel's VXLAN module, specifically in the function vxlan_na_create(). This function processes Neighbor Discovery (ND) options and advances a parser based on option-provided lengths. Due to insufficient validation, a malformed ND option can cause the parser to advance beyond the computed option span or use a too-short source LLADDR option payload, leading to an out-of-bounds read [1].

An attacker can trigger the vulnerability by sending a specially crafted VXLAN packet to a target system. No authentication is required if the system is listening on a VXLAN interface. The malformed ND option manipulates the length field to cause the parser to read beyond the intended buffer boundaries, potentially accessing kernel memory that should be inaccessible [2].

The impact is limited to an out-of-bounds read, which could leak sensitive kernel memory contents. This information disclosure could aid an attacker in bypassing security mechanisms like KASLR. The CVSS v3 score of 5.5 (Medium) reflects the need for network access and the likelihood of some information disclosure, but not arbitrary control [3].

The fix is available in stable kernel commits that add proper validation of ND option lengths before advancing the parser, ensuring the source LLADDR is only read when the option is sufficiently large for an Ethernet address [4]. Systems should apply these patches from the respective stable kernels to mitigate the vulnerability.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

9
  • Linux/Kernel9 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 8 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=3.12.18,<3.13
    • cpe:2.3:o:linux:linux_kernel:3.14:-:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:3.14:rc8:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.