U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2026-31780 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: wilc1000: fix u8 overflow in SSID scan buffer size calculation The variable valuesize is declared as u8 but accumulates the total length of all SSIDs to scan. Each SSID contributes up to 33 bytes (IEEE80211_MAX_SSID_LEN + 1), and with WILC_MAX_NUM_PROBED_SSID (10) SSIDs the total can reach 330, which wraps around to 74 when stored in a u8. This causes kmalloc to allocate only 75 bytes while the subsequent memcpy writes up to 331 bytes into the buffer, resulting in a 256-byte heap buffer overflow. Widen valuesize from u8 to u32 to accommodate the full range.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/0c7f21d8bd2f93998b72b7a7f93152336aeca4dd kernel.org
https://git.kernel.org/stable/c/34a23fd9ddd683a03c7e8cc0ceded3e59e354b99 kernel.org
https://git.kernel.org/stable/c/549f02d8ec94d39092ab6d9b103d0d6783a4b024 kernel.org
https://git.kernel.org/stable/c/9907ac9b9a18b92fc34b9e4cb9e10f208dc1d3f7 kernel.org
https://git.kernel.org/stable/c/bfbddeadd4779651403035ee177ae2f22f9f5521 kernel.org
https://git.kernel.org/stable/c/c97b2a00059608592ad0d86fbb813a4f8cf9464b kernel.org
https://git.kernel.org/stable/c/d049e56b1739101d1c4d81deedb269c52a8dbba0 kernel.org
https://git.kernel.org/stable/c/d8388614de613c28eeb659c10115060a83739924 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2026-31780
NVD Published Date:
05/01/2026
NVD Last Modified:
05/03/2026
Source:
kernel.org