{"id":"CVE-2026-31670","summary":"net: rfkill: prevent unlimited numbers of rfkill events from being created","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: rfkill: prevent unlimited numbers of rfkill events from being created\n\nUserspace can create an unlimited number of rfkill events if the system\nis so configured, while not consuming them from the rfkill file\ndescriptor, causing a potential out of memory situation.  Prevent this\nfrom bounding the number of pending rfkill events at a \"large\" number\n(i.e. 1000) to prevent abuses like this.","modified":"2026-04-26T04:22:20.854822Z","published":"2026-04-24T14:45:17.958Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/31xxx/CVE-2026-31670.json","cna_assigner":"Linux"},"references":[{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4bcd1615a4e2a185ae9edd27b4143d7dfa7134f4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/673d2a3eef6e0ee9736501a150c9e4024a4e60a6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/80ce4cb026f0a4c4532b6cad827b44debda6256a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/82843afc19012a29ba863961ef494165aa1a88f4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a8c26800e0220e1550af012f5a20e50f5c78864d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b1e0c8d3ab58a0161db487bf5fc47adfcaf5d5ca"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e3842779547c83150569071d9980517cc9029fc0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ea245d78dec594372e27d8c79616baf49e98a4a1"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/31xxx/CVE-2026-31670.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-31670"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"c64fb01627e24725d1f9d535e4426475a4415753"},{"fixed":"4bcd1615a4e2a185ae9edd27b4143d7dfa7134f4"},{"fixed":"b1e0c8d3ab58a0161db487bf5fc47adfcaf5d5ca"},{"fixed":"e3842779547c83150569071d9980517cc9029fc0"},{"fixed":"673d2a3eef6e0ee9736501a150c9e4024a4e60a6"},{"fixed":"82843afc19012a29ba863961ef494165aa1a88f4"},{"fixed":"a8c26800e0220e1550af012f5a20e50f5c78864d"},{"fixed":"80ce4cb026f0a4c4532b6cad827b44debda6256a"},{"fixed":"ea245d78dec594372e27d8c79616baf49e98a4a1"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-31670.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.31"},{"fixed":"5.10.253"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.203"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.169"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.135"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.82"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.23"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.19.0"},{"fixed":"6.19.13"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-31670.json"}}],"schema_version":"1.7.5"}