CVE-2026-31743

high

Description

In the Linux kernel, the following vulnerability has been resolved: nvmem: zynqmp_nvmem: Fix buffer size in DMA and memcpy Buffer size used in dma allocation and memcpy is wrong. It can lead to undersized DMA buffer access and possible memory corruption. use correct buffer size in dma_alloc_coherent and memcpy.

References

https://git.kernel.org/stable/c/f9b88613ff402aa6fe8fd020573cb95867ae947e

https://git.kernel.org/stable/c/784ed4abded1ca4b525fa4cade8b02f8c5d2a087

https://git.kernel.org/stable/c/6c01e7f11f5e5f22285d19510a9643e2506e13c3

https://git.kernel.org/stable/c/2f6e5b9964d0a63a5ba84fca2642876afb70a662

Details

Source: Mitre, NVD

Published: 2026-05-01

Updated: 2026-05-03

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.00018