{"api_version":"1","generated_at":"2026-05-13T11:08:59+00:00","cve":"CVE-2026-31627","urls":{"html":"https://cve.report/CVE-2026-31627","api":"https://cve.report/api/cve/CVE-2026-31627.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-31627","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-31627"},"summary":{"title":"i2c: s3c24xx: check the size of the SMBUS message before using it","description":"In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: s3c24xx: check the size of the SMBUS message before using it\n\nThe first byte of an i2c SMBUS message is the size, and it should be\nverified to ensure that it is in the range of 0..I2C_SMBUS_BLOCK_MAX\nbefore processing it.\n\nThis is the same logic that was added in commit a6e04f05ce0b (\"i2c:\ntegra: check msg length in SMBUS block read\") to the i2c tegra driver.","state":"PUBLISHED","assigner":"Linux","published_at":"2026-04-24 15:16:42","updated_at":"2026-04-27 20:43:43"},"problem_types":["NVD-CWE-noinfo"],"metrics":[{"version":"3.1","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","type":"Secondary","score":"7.8","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"7.8","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://git.kernel.org/stable/c/d87d5620125a03b1eadbd5df39748215d3db7ddb","name":"https://git.kernel.org/stable/c/d87d5620125a03b1eadbd5df39748215d3db7ddb","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/71b3c316b22c555d2769126a92b1244b15a9750d","name":"https://git.kernel.org/stable/c/71b3c316b22c555d2769126a92b1244b15a9750d","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/c0128c7157d639a931353ea344fb44aad6d6e17a","name":"https://git.kernel.org/stable/c/c0128c7157d639a931353ea344fb44aad6d6e17a","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/aaaaec39ddbcd06770dca7f1adebc3b1242ebe7b","name":"https://git.kernel.org/stable/c/aaaaec39ddbcd06770dca7f1adebc3b1242ebe7b","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/377fae22a137b6b89f3f32399a58c52cf2325416","name":"https://git.kernel.org/stable/c/377fae22a137b6b89f3f32399a58c52cf2325416","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/fa00738ab30b07db1a43b9c85fc56b8cc3b7d197","name":"https://git.kernel.org/stable/c/fa00738ab30b07db1a43b9c85fc56b8cc3b7d197","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-31627","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-31627","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 85747311ecb6167c989093c64a13807366fdd3a9 fa00738ab30b07db1a43b9c85fc56b8cc3b7d197 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 85747311ecb6167c989093c64a13807366fdd3a9 d87d5620125a03b1eadbd5df39748215d3db7ddb git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 85747311ecb6167c989093c64a13807366fdd3a9 377fae22a137b6b89f3f32399a58c52cf2325416 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 85747311ecb6167c989093c64a13807366fdd3a9 71b3c316b22c555d2769126a92b1244b15a9750d git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 85747311ecb6167c989093c64a13807366fdd3a9 aaaaec39ddbcd06770dca7f1adebc3b1242ebe7b git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 85747311ecb6167c989093c64a13807366fdd3a9 c0128c7157d639a931353ea344fb44aad6d6e17a git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 3.10","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 3.10 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.6.136 6.6.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.12.83 6.12.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.18.24 6.18.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19.14 6.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.0.1 7.0.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.1-rc1 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"31627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"31627","cve":"CVE-2026-31627","epss":"0.000180000","percentile":"0.048130000","score_date":"2026-04-27","updated_at":"2026-04-28 00:06:43"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["drivers/i2c/busses/i2c-s3c2410.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"fa00738ab30b07db1a43b9c85fc56b8cc3b7d197","status":"affected","version":"85747311ecb6167c989093c64a13807366fdd3a9","versionType":"git"},{"lessThan":"d87d5620125a03b1eadbd5df39748215d3db7ddb","status":"affected","version":"85747311ecb6167c989093c64a13807366fdd3a9","versionType":"git"},{"lessThan":"377fae22a137b6b89f3f32399a58c52cf2325416","status":"affected","version":"85747311ecb6167c989093c64a13807366fdd3a9","versionType":"git"},{"lessThan":"71b3c316b22c555d2769126a92b1244b15a9750d","status":"affected","version":"85747311ecb6167c989093c64a13807366fdd3a9","versionType":"git"},{"lessThan":"aaaaec39ddbcd06770dca7f1adebc3b1242ebe7b","status":"affected","version":"85747311ecb6167c989093c64a13807366fdd3a9","versionType":"git"},{"lessThan":"c0128c7157d639a931353ea344fb44aad6d6e17a","status":"affected","version":"85747311ecb6167c989093c64a13807366fdd3a9","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["drivers/i2c/busses/i2c-s3c2410.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"3.10"},{"lessThan":"3.10","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"6.6.*","status":"unaffected","version":"6.6.136","versionType":"semver"},{"lessThanOrEqual":"6.12.*","status":"unaffected","version":"6.12.83","versionType":"semver"},{"lessThanOrEqual":"6.18.*","status":"unaffected","version":"6.18.24","versionType":"semver"},{"lessThanOrEqual":"6.19.*","status":"unaffected","version":"6.19.14","versionType":"semver"},{"lessThanOrEqual":"7.0.*","status":"unaffected","version":"7.0.1","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"7.1-rc1","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.136","versionStartIncluding":"3.10","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.12.83","versionStartIncluding":"3.10","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.18.24","versionStartIncluding":"3.10","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.14","versionStartIncluding":"3.10","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0.1","versionStartIncluding":"3.10","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.1-rc1","versionStartIncluding":"3.10","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: s3c24xx: check the size of the SMBUS message before using it\n\nThe first byte of an i2c SMBUS message is the size, and it should be\nverified to ensure that it is in the range of 0..I2C_SMBUS_BLOCK_MAX\nbefore processing it.\n\nThis is the same logic that was added in commit a6e04f05ce0b (\"i2c:\ntegra: check msg length in SMBUS block read\") to the i2c tegra driver."}],"metrics":[{"cvssV3_1":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"providerMetadata":{"dateUpdated":"2026-04-27T14:04:28.890Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/fa00738ab30b07db1a43b9c85fc56b8cc3b7d197"},{"url":"https://git.kernel.org/stable/c/d87d5620125a03b1eadbd5df39748215d3db7ddb"},{"url":"https://git.kernel.org/stable/c/377fae22a137b6b89f3f32399a58c52cf2325416"},{"url":"https://git.kernel.org/stable/c/71b3c316b22c555d2769126a92b1244b15a9750d"},{"url":"https://git.kernel.org/stable/c/aaaaec39ddbcd06770dca7f1adebc3b1242ebe7b"},{"url":"https://git.kernel.org/stable/c/c0128c7157d639a931353ea344fb44aad6d6e17a"}],"title":"i2c: s3c24xx: check the size of the SMBUS message before using it","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-31627","datePublished":"2026-04-24T14:42:48.342Z","dateReserved":"2026-03-09T15:48:24.124Z","dateUpdated":"2026-04-27T14:04:28.890Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-24 15:16:42","lastModifiedDate":"2026-04-27 20:43:43","problem_types":["NVD-CWE-noinfo"],"metrics":{"cvssMetricV31":[{"source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.10.1","versionEndExcluding":"6.6.136","matchCriteriaId":"FB898C76-28CD-416F-9777-F00444862F17"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7","versionEndExcluding":"6.12.83","matchCriteriaId":"7F0AE5B5-23AC-4DCC-B37A-51CA1DAE7BA8"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.13","versionEndExcluding":"6.18.24","matchCriteriaId":"8126B8B8-6D0B-4443-86C1-672AEE893555"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.19","versionEndExcluding":"6.19.14","matchCriteriaId":"D6A8A074-BBF4-4803-ABED-519A839435BB"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0","versionEndExcluding":"7.0.1","matchCriteriaId":"9B5888AB-7403-4335-89E4-21CC0B48366A"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:3.10:-:*:*:*:*:*:*","matchCriteriaId":"82D28405-E1F2-43CF-AA38-B228805AFFF9"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"31627","Ordinal":"1","Title":"i2c: s3c24xx: check the size of the SMBUS message before using i","CVE":"CVE-2026-31627","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"31627","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: s3c24xx: check the size of the SMBUS message before using it\n\nThe first byte of an i2c SMBUS message is the size, and it should be\nverified to ensure that it is in the range of 0..I2C_SMBUS_BLOCK_MAX\nbefore processing it.\n\nThis is the same logic that was added in commit a6e04f05ce0b (\"i2c:\ntegra: check msg length in SMBUS block read\") to the i2c tegra driver.","Type":"Description","Title":"i2c: s3c24xx: check the size of the SMBUS message before using i"}]}}}