Description
In the Linux kernel, the following vulnerability has been resolved:

media: dvb-net: fix OOB access in ULE extension header tables

The ule_mandatory_ext_handlers[] and ule_optional_ext_handlers[] tables
in handle_one_ule_extension() are declared with 255 elements (valid
indices 0-254), but the index htype is derived from network-controlled
data as (ule_sndu_type & 0x00FF), giving a range of 0-255. When
htype equals 255, an out-of-bounds read occurs on the function pointer
table, and the OOB value may be called as a function pointer.

Add a bounds check on htype against the array size before either table
is accessed. Out-of-range values now cause the SNDU to be discarded.
Published: 2026-04-06
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Kernel Code Execution via Out‑of‑Bounds Access
Action: Patch
AI Analysis

Impact

A missing bounds check in the Linux kernel media dvb‑net driver allows an out‑of‑bounds read of function pointer tables when the ULE extension type field is set to 255. The invalid index can cause the kernel to invoke an unintended function pointer, potentially allowing an attacker to execute arbitrary code with kernel privileges. The vulnerability is a classic example of a bounds check failure (CWE‑1285).

Affected Systems

All Linux kernel versions that contain the dvb‑net driver without the recent patch are affected. No specific version range is listed, so any kernel before the fix is considered vulnerable. The issue arises in the handling of ULE extension tables received from network‑controlled data streams over DVB interfaces.

Risk and Exploitability

The CVSS score is not provided, and the EPSS score is below 1%. The vulnerability is not in the CISA KEV catalog. However, the impact is severe because execution occurs with kernel privileges. The attack requires the ability to send crafted DVB network data containing a ULE extension with type 255 to a vulnerable system. The exploit is likely to be performed over a network interface, so systems exposed to external DVB traffic should be considered at risk. Due to the low EPSS, widespread exploitation is not yet common, but the potential for remote kernel compromise warrants immediate attention.

Generated by OpenCVE AI on April 7, 2026 at 09:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a kernel update that includes the bounds‑check patch for the dvb‑net driver.
  • Verify the kernel version to ensure the fix is present.
  • If an update is not yet available, suspend or restrict use of DVB interfaces on the affected host.
  • Monitor vendor advisories and kernel mailing list releases for the patch date and apply hotfixes promptly.

Generated by OpenCVE AI on April 7, 2026 at 09:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Sat, 18 Apr 2026 09:15:00 +0000


Tue, 07 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119
CWE-125

Tue, 07 Apr 2026 00:00:00 +0000


Mon, 06 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: media: dvb-net: fix OOB access in ULE extension header tables The ule_mandatory_ext_handlers[] and ule_optional_ext_handlers[] tables in handle_one_ule_extension() are declared with 255 elements (valid indices 0-254), but the index htype is derived from network-controlled data as (ule_sndu_type & 0x00FF), giving a range of 0-255. When htype equals 255, an out-of-bounds read occurs on the function pointer table, and the OOB value may be called as a function pointer. Add a bounds check on htype against the array size before either table is accessed. Out-of-range values now cause the SNDU to be discarded.
Title media: dvb-net: fix OOB access in ULE extension header tables
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-27T14:02:52.534Z

Reserved: 2026-03-09T15:48:24.086Z

Link: CVE-2026-31405

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-06T08:16:38.253

Modified: 2026-04-27T14:16:36.520

Link: CVE-2026-31405

cve-icon Redhat

Severity :

Publid Date: 2026-04-06T00:00:00Z

Links: CVE-2026-31405 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:52:38Z

Weaknesses