CVE-2026-31738
Published: Fri, 01 May 2026 15:16
Summary
In the Linux kernel, the following vulnerability has been resolved: vxlan: validate ND option lengths in vxlan_na_create vxlan_na_create() walks ND options according to option-provided lengths. A ma
Details
In the Linux kernel, the following vulnerability has been resolved: vxlan: validate ND option lengths in vxlan_na_create vxlan_na_create() walks ND options according to option-provided lengths. A malformed option can make the parser advance beyond the computed option span or use a too-short source LLADDR option payload. Validate option lengths against the remaining NS option area before advancing, and only read source LLADDR when the option is large enough for an Ethernet address.
Are YOU affected by CVE-2026-31738?
5-second check on your actual server. Reads /etc/os-release, uname -r, and dpkg-query; matches against the live USN + Debian Security Tracker feeds; tells you whether CVE-2026-31738 (and any other live CVE) applies. Anonymous, no signup.
curl https://mindsparkstack.com/scan.sh | bash
References
- https://git.kernel.org/stable/c/2029712fb2c87e9a8c75094906f2ee29bf08c500
- https://git.kernel.org/stable/c/602596c69a70e50d9ab8c6ae0290a01f88229dd7
- https://git.kernel.org/stable/c/901c1dd3bab2955d7e664f914c374c8c3ac2b958
- https://git.kernel.org/stable/c/afa9a05e6c4971bd5586f1b304e14d61fb3d9385
- https://git.kernel.org/stable/c/b69c4236255bd8de16cd876e58c6f0867d1d78b1
- https://git.kernel.org/stable/c/de20d2e3b9179d132f5f5b44e490d7c916c6321b
- https://git.kernel.org/stable/c/e476745917a1e288eb15e7ff49d286a86a4861d3
- https://git.kernel.org/stable/c/eddfce70a6f3107d1679b0c2fcbeb96b593bd679
StackPatch runs this match against YOUR installed packages every hour
Free 1-server / $99 lifetime founder seat (50 only) / $19+/mo monthly. Indie pricing.