PT-2026-30573 · Linux · Linux
Published
2026-04-06
·
Updated
2026-04-06
·
CVE-2026-31405
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
media: dvb-net: fix OOB access in ULE extension header tables
The ule mandatory ext handlers[] and ule optional ext handlers[] tables
in handle one ule extension() are declared with 255 elements (valid
indices 0-254), but the index htype is derived from network-controlled
data as (ule sndu type & 0x00FF), giving a range of 0-255. When
htype equals 255, an out-of-bounds read occurs on the function pointer
table, and the OOB value may be called as a function pointer.
Add a bounds check on htype against the array size before either table
is accessed. Out-of-range values now cause the SNDU to be discarded.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux