Description
In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: fix potential out-of-bounds read in iwl_mvm_nd_match_info_handler()

The memcpy function assumes the dynamic array notif->matches is at least
as large as the number of bytes to copy. Otherwise, results->matches may
contain unwanted data. To guarantee safety, extend the validation in one
of the checks to ensure sufficient packet length.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
Published: 2026-05-01
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw was found in the iwl_mvm_nd_match_info_handler function of the iwlwifi driver. The memcpy call assumes that the dynamic array notif->matches is large enough for the number of bytes to be copied. If this assumption fails, the function copies data past the end of the array, causing an out-of-bounds read. The result is that sensitive kernel information may be exposed to an attacker, classifying the weakness under CWE-20: Improper Input Validation.

Affected Systems

The vulnerability affects Linux kernels that include the iwlwifi driver before the patch referenced by commits 744fabc… and ca0e949…. Any distribution that shipped a kernel prior to these commits is potentially vulnerable. The exact kernel version range is not listed in the advisory, but any kernel installing iwlwifi without the fix is at risk.

Risk and Exploitability

EPSS data is not available and the vulnerability is not listed in KEV, so the publicly reported exploitation probability is unknown. However, the flaw requires the delivery of crafted WiFi packets to a target machine, making the attack vector remote and dependent on wireless traffic control. While the attack may be complex, the read of kernel memory could expose confidential data, and the lack of mitigation outside the kernel suggests that patching remains the prudent course of action.

Generated by OpenCVE AI on May 2, 2026 at 07:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that contains the iwlwifi mvm patch (e.g., a kernel including commit 744fabc or later).
  • If an immediate kernel upgrade is not feasible, disable the iwlwifi driver or restrict WiFi traffic to limit exposure to malicious packets.
  • Apply any vendor‑specific security updates or firmware updates for WiFi adapters that may address the issue.

Generated by OpenCVE AI on May 2, 2026 at 07:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4561-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6243-1 linux security update
History

Sat, 02 May 2026 07:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Fri, 01 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: fix potential out-of-bounds read in iwl_mvm_nd_match_info_handler() The memcpy function assumes the dynamic array notif->matches is at least as large as the number of bytes to copy. Otherwise, results->matches may contain unwanted data. To guarantee safety, extend the validation in one of the checks to ensure sufficient packet length. Found by Linux Verification Center (linuxtesting.org) with SVACE.
Title wifi: iwlwifi: mvm: fix potential out-of-bounds read in iwl_mvm_nd_match_info_handler()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-01T14:15:06.506Z

Reserved: 2026-03-09T15:48:24.140Z

Link: CVE-2026-31779

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-01T15:16:41.330

Modified: 2026-05-01T15:24:14.893

Link: CVE-2026-31779

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T07:30:36Z

Weaknesses