Lyrie
Critical CVE
CVSS 9.13 sources verified·1 min read
By Lyrie Threat Intelligence·4/27/2026

CRITICAL: CVE-2026-31682 (CVSS 9.1) — multiple products

CVE: CVE-2026-31682

CVSS: 9.1 (3.1) — CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Severity: CRITICAL

Status: Critical advisory

Affected

_See vendor advisory_

Summary

In the Linux kernel, the following vulnerability has been resolved:

bridge: br_nd_send: linearize skb before parsing ND options

br_nd_send() parses neighbour discovery options from ns->opt[] and

assumes that these options are in the linear part of request.

Its callers only guarantee that the ICMPv6 header and target address

are available, so the option area can still be non-linear. Parsing

ns->opt[] in that case can access data past the linear buffer.

Linearize request before option parsing and derive ns from the linear

network header.

Verified Sources

References

  • https://git.kernel.org/stable/c/2ba4caba423ed94d63006eb1d2227b0332ab7fcd
  • https://git.kernel.org/stable/c/3a30f6469b058574f49efde61cd6f5d79e576053
  • https://git.kernel.org/stable/c/4f397b950c916e9a1f8a4fce04ea0110206cad47
  • https://git.kernel.org/stable/c/658261898130da620fc3d0fbb0523efb3366cb55
  • https://git.kernel.org/stable/c/9c55e41c73af5c4511070933b1bd25248521270c
  • https://git.kernel.org/stable/c/a01aee7cafc575bb82f5529e8734e7052f9b16ea
  • https://git.kernel.org/stable/c/bd91ec85aa4c77d645bd2739fc56784157a88ca2
  • https://git.kernel.org/stable/c/c68433fd291c9e88c00292095172c62d1997d662

_Validated by the Lyrie Threat Intelligence Pipeline — 3 independent sources confirmed before publication. No speculation._

Lyrie Verdict

A vulnerability of this severity is exactly what Lyrie's anti-rogue-AI defense is built for: continuous, autonomous monitoring that doesn't wait for human reaction time.

Validated sources

  1. [1]NVD
  2. [2]GitHub Advisory
  3. [3]MITRE