Description
In the Linux kernel, the following vulnerability has been resolved:

comedi: me_daq: Fix potential overrun of firmware buffer

`me2600_xilinx_download()` loads the firmware that was requested by
`request_firmware()`. It is possible for it to overrun the source
buffer because it blindly trusts the file format. It reads a data
stream length from the first 4 bytes into variable `file_length` and
reads the data stream contents of length `file_length` from offset 16
onwards. Although it checks that the supplied firmware is at least 16
bytes long, it does not check that it is long enough to contain the data
stream.

Add a test to ensure that the supplied firmware is long enough to
contain the header and the data stream. On failure, log an error and
return `-EINVAL`.
Published: 2026-05-01
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability exists in the comedi driver’s firmware loader for the me_daq device. When a firmware file is requested, the loader reads a 4‑byte length from the first four bytes of the file and copies that many bytes starting at offset 16, assuming the file contains that amount of data. Because the loader only checks that the firmware is at least 16 bytes long, it can copy beyond the end of the buffer if the declared length exceeds the remaining bytes in the file. This omission can overwrite adjacent kernel memory, leading to memory corruption that could cause a kernel crash or instability. The weakness corresponds to a buffer overrun (CWE‑1284).

Affected Systems

All Linux kernel installations that include the comedi me_daq driver and have not incorporated the patch are affected. No specific version range is provided, but any kernel that still contains the unguarded firmware loader code is vulnerable. Users who load firmware through the me_daq device are at risk.

Risk and Exploitability

The EPSS score is not available and the vulnerability is not listed in CISA’s KEV catalog, indicating no known widespread exploitation. Exploitation requires access to the affected hardware and the ability to trigger a firmware load, implying a local or device‑based attack vector. In the absence of a public exploit, the risk is moderate to high for environments that use the me_daq driver and could experience kernel instability from the memory corruption. The CVSS score is not supplied in the data, but a kernel buffer overrun typically warrants a high severity rating.

Generated by OpenCVE AI on May 2, 2026 at 07:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that contains the commit adding a length check to the me_daq firmware loader
  • If an upgrade is not immediately available, unload or blacklist the comedi me_daq module to prevent firmware loading
  • When firmware is necessary, validate that the firmware file’s declared length does not exceed the actual size before loading it

Generated by OpenCVE AI on May 2, 2026 at 07:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4561-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6243-1 linux security update
History

Sat, 02 May 2026 00:15:00 +0000


Fri, 01 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: comedi: me_daq: Fix potential overrun of firmware buffer `me2600_xilinx_download()` loads the firmware that was requested by `request_firmware()`. It is possible for it to overrun the source buffer because it blindly trusts the file format. It reads a data stream length from the first 4 bytes into variable `file_length` and reads the data stream contents of length `file_length` from offset 16 onwards. Although it checks that the supplied firmware is at least 16 bytes long, it does not check that it is long enough to contain the data stream. Add a test to ensure that the supplied firmware is long enough to contain the header and the data stream. On failure, log an error and return `-EINVAL`.
Title comedi: me_daq: Fix potential overrun of firmware buffer
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-01T14:14:41.545Z

Reserved: 2026-03-09T15:48:24.138Z

Link: CVE-2026-31748

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-01T15:16:37.593

Modified: 2026-05-01T15:24:14.893

Link: CVE-2026-31748

cve-icon Redhat

Severity :

Publid Date: 2026-05-01T00:00:00Z

Links: CVE-2026-31748 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T07:45:37Z

Weaknesses