{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-31743","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2026-03-09T15:48:24.138Z","datePublished":"2026-05-01T14:14:38.154Z","dateUpdated":"2026-05-11T22:14:54.119Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T22:14:54.119Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnvmem: zynqmp_nvmem: Fix buffer size in DMA and memcpy\n\nBuffer size used in dma allocation and memcpy is wrong.\nIt can lead to undersized DMA buffer access and possible\nmemory corruption. use correct buffer size in dma_alloc_coherent\nand memcpy."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH"}}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/nvmem/zynqmp_nvmem.c"],"versions":[{"version":"737c0c8d07b5f671c0a33cec95965fcb2d2ea893","lessThan":"2f6e5b9964d0a63a5ba84fca2642876afb70a662","status":"affected","versionType":"git"},{"version":"737c0c8d07b5f671c0a33cec95965fcb2d2ea893","lessThan":"784ed4abded1ca4b525fa4cade8b02f8c5d2a087","status":"affected","versionType":"git"},{"version":"737c0c8d07b5f671c0a33cec95965fcb2d2ea893","lessThan":"6c01e7f11f5e5f22285d19510a9643e2506e13c3","status":"affected","versionType":"git"},{"version":"737c0c8d07b5f671c0a33cec95965fcb2d2ea893","lessThan":"f9b88613ff402aa6fe8fd020573cb95867ae947e","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/nvmem/zynqmp_nvmem.c"],"versions":[{"version":"6.9","status":"affected"},{"version":"0","lessThan":"6.9","status":"unaffected","versionType":"semver"},{"version":"6.12.81","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.18.22","lessThanOrEqual":"6.18.*","status":"unaffected","versionType":"semver"},{"version":"6.19.12","lessThanOrEqual":"6.19.*","status":"unaffected","versionType":"semver"},{"version":"7.0","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.9","versionEndExcluding":"6.12.81"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.9","versionEndExcluding":"6.18.22"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.9","versionEndExcluding":"6.19.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.9","versionEndExcluding":"7.0"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/2f6e5b9964d0a63a5ba84fca2642876afb70a662"},{"url":"https://git.kernel.org/stable/c/784ed4abded1ca4b525fa4cade8b02f8c5d2a087"},{"url":"https://git.kernel.org/stable/c/6c01e7f11f5e5f22285d19510a9643e2506e13c3"},{"url":"https://git.kernel.org/stable/c/f9b88613ff402aa6fe8fd020573cb95867ae947e"}],"title":"nvmem: zynqmp_nvmem: Fix buffer size in DMA and memcpy","x_generator":{"engine":"bippy-1.2.0"}}}}