Impact
A malformed Neighbor Discovery (ND) option can cause the Linux kernel bridge code to read beyond the intended option data or to treat an incomplete source link‑layer address as a full Ethernet address. This out‑of‑bounds read or write corrupts kernel memory and allows an attacker who can inject custom Ethernet frames over a bridged interface to execute arbitrary code with kernel privileges.
Affected Systems
The flaw exists in the generic bridge driver that ships with all Linux kernel builds. Kernels that do not contain the patch introduced in the commits referenced in the advisory are vulnerable. Distributions still shipping older kernel versions remain exposed until they upgrade to a kernel that includes the validation fix.
Risk and Exploitability
The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, so the exploitation probability is uncertain. However, the flaw permits memory corruption with merely network access to a bridged interface, and it can lead to remote code execution. The CVSS score of 7.0 indicates high severity, underscoring the potential impact on exposed hosts.
OpenCVE Enrichment
Debian DLA
Debian DSA