Description
In the Linux kernel, the following vulnerability has been resolved:

vxlan: validate ND option lengths in vxlan_na_create

vxlan_na_create() walks ND options according to option-provided
lengths. A malformed option can make the parser advance beyond the
computed option span or use a too-short source LLADDR option payload.

Validate option lengths against the remaining NS option area before
advancing, and only read source LLADDR when the option is large enough
for an Ethernet address.
Published: 2026-05-01
Score: 7.0 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In the Linux kernel, a flaw in the vxlan_na_create function allows a specially crafted VXLAN packet to cause the kernel to read or write memory beyond the intended bounds of the ND options area. The bug occurs because the implementation does not validate that each option length fits within the remaining space, nor does it verify that a source LLADDR option is long enough to hold an Ethernet address. When an attacker sends a malformed VXLAN packet containing an oversized or undersized option, the kernel can advance past the correct boundary or access an incomplete address, leading to a buffer overflow that can crash the kernel or be leveraged for arbitrary code execution. The flaw is a classic out‑of‑bounds memory access associated with CWE‑1284.

Affected Systems

Linux kernel on any system that has the vxlan module enabled before the patch. The affected vendor is Linux, the product is the Linux kernel, but no specific version list is provided. The fix is included in recent kernel releases (the commit range can be found in the kernel source history). Systems that run older kernel versions are potentially vulnerable if they continue to use VXLAN tunnels from untrusted peers.

Risk and Exploitability

The vulnerability is exploitable via network traffic; an attacker who can send malicious VXLAN packets can trigger it. The EPSS score is not available. The CVSS score of 7.0 indicates high severity, reflecting potential privilege escalation to root. The vulnerability is not yet listed in the CISA KEV catalog, but its kernel context warrants careful attention.

Generated by OpenCVE AI on May 2, 2026 at 12:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a patched release that includes the vxlan_na_create ND option length validation commit.
  • Restrict VXLAN UDP traffic (port 4789) to trusted sources using firewall rules to limit exposure to malicious packets.
  • If the VXLAN interface or module is unnecessary, disable it to eliminate the code path vulnerable to exploitation.

Generated by OpenCVE AI on May 2, 2026 at 12:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4561-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6243-1 linux security update
History

Sat, 02 May 2026 11:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
CWE-122

Sat, 02 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1284
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Sat, 02 May 2026 00:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
CWE-122

Fri, 01 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: vxlan: validate ND option lengths in vxlan_na_create vxlan_na_create() walks ND options according to option-provided lengths. A malformed option can make the parser advance beyond the computed option span or use a too-short source LLADDR option payload. Validate option lengths against the remaining NS option area before advancing, and only read source LLADDR when the option is large enough for an Ethernet address.
Title vxlan: validate ND option lengths in vxlan_na_create
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-01T14:14:34.900Z

Reserved: 2026-03-09T15:48:24.138Z

Link: CVE-2026-31738

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-01T15:16:36.473

Modified: 2026-05-01T15:24:14.893

Link: CVE-2026-31738

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-01T00:00:00Z

Links: CVE-2026-31738 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T12:30:27Z

Weaknesses