Home

Description

In the Linux kernel, the following vulnerability has been resolved: nvmem: zynqmp_nvmem: Fix buffer size in DMA and memcpy Buffer size used in dma allocation and memcpy is wrong. It can lead to undersized DMA buffer access and possible memory corruption. use correct buffer size in dma_alloc_coherent and memcpy.

PUBLISHED Reserved 2026-03-09 | Published 2026-05-01 | Updated 2026-05-03 | Assigner Linux




HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Product status

Default status
unaffected

737c0c8d07b5f671c0a33cec95965fcb2d2ea893 (git) before 2f6e5b9964d0a63a5ba84fca2642876afb70a662
affected

737c0c8d07b5f671c0a33cec95965fcb2d2ea893 (git) before 784ed4abded1ca4b525fa4cade8b02f8c5d2a087
affected

737c0c8d07b5f671c0a33cec95965fcb2d2ea893 (git) before 6c01e7f11f5e5f22285d19510a9643e2506e13c3
affected

737c0c8d07b5f671c0a33cec95965fcb2d2ea893 (git) before f9b88613ff402aa6fe8fd020573cb95867ae947e
affected

Default status
affected

6.9
affected

Any version before 6.9
unaffected

6.12.81 (semver)
unaffected

6.18.22 (semver)
unaffected

6.19.12 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/2f6e5b9964d0a63a5ba84fca2642876afb70a662

git.kernel.org/...c/784ed4abded1ca4b525fa4cade8b02f8c5d2a087

git.kernel.org/...c/6c01e7f11f5e5f22285d19510a9643e2506e13c3

git.kernel.org/...c/f9b88613ff402aa6fe8fd020573cb95867ae947e

cve.org (CVE-2026-31743)

nvd.nist.gov (CVE-2026-31743)

Download JSON