CVE-2026-31779
Awaiting Analysis Awaiting Analysis - Queue
Out-of-Bounds Read in Linux Kernel iwlwifi MVM Driver

Publication date: 2026-05-01

Last updated on: 2026-05-03

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: fix potential out-of-bounds read in iwl_mvm_nd_match_info_handler() The memcpy function assumes the dynamic array notif->matches is at least as large as the number of bytes to copy. Otherwise, results->matches may contain unwanted data. To guarantee safety, extend the validation in one of the checks to ensure sufficient packet length. Found by Linux Verification Center (linuxtesting.org) with SVACE.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-01
Last Modified
2026-05-03
Generated
2026-05-07
AI Q&A
2026-05-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
intel iwlwifi *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's iwlwifi driver, specifically in the mvm component. It involves a potential out-of-bounds read in the function iwl_mvm_nd_match_info_handler(). The issue arises because the memcpy function assumes that the dynamic array notif->matches is at least as large as the number of bytes to copy. If this assumption is incorrect, the results->matches array may contain unwanted or invalid data. The fix involves extending validation checks to ensure the packet length is sufficient before performing the copy, preventing out-of-bounds reads.


How can this vulnerability impact me? :

This vulnerability can lead to out-of-bounds reads in kernel memory, which may cause the system to behave unpredictably or expose unintended data. Such memory safety issues can potentially be exploited to cause crashes or information leaks, impacting system stability and security.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart