PT-2026-30573 · Linux · Linux

Published

2026-04-06

·

Updated

2026-04-06

·

CVE-2026-31405

None

No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
media: dvb-net: fix OOB access in ULE extension header tables
The ule mandatory ext handlers[] and ule optional ext handlers[] tables in handle one ule extension() are declared with 255 elements (valid indices 0-254), but the index htype is derived from network-controlled data as (ule sndu type & 0x00FF), giving a range of 0-255. When htype equals 255, an out-of-bounds read occurs on the function pointer table, and the OOB value may be called as a function pointer.
Add a bounds check on htype against the array size before either table is accessed. Out-of-range values now cause the SNDU to be discarded.

Related Identifiers

CVE-2026-31405

Affected Products

Linux