CVE-2026-23172
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/02/2026
Last modified:
14/02/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: wwan: t7xx: fix potential skb->frags overflow in RX path<br />
<br />
When receiving data in the DPMAIF RX path,<br />
the t7xx_dpmaif_set_frag_to_skb() function adds<br />
page fragments to an skb without checking if the number of<br />
fragments has exceeded MAX_SKB_FRAGS. This could lead to a buffer overflow<br />
in skb_shinfo(skb)->frags[] array, corrupting adjacent memory and<br />
potentially causing kernel crashes or other undefined behavior.<br />
<br />
This issue was identified through static code analysis by comparing with a<br />
similar vulnerability fixed in the mt76 driver commit b102f0c522cf ("mt76:<br />
fix array overflow on receiving too many fragments for a packet").<br />
<br />
The vulnerability could be triggered if the modem firmware sends packets<br />
with excessive fragments. While under normal protocol conditions (MTU 3080<br />
bytes, BAT buffer 3584 bytes),<br />
a single packet should not require additional<br />
fragments, the kernel should not blindly trust firmware behavior.<br />
Malicious, buggy, or compromised firmware could potentially craft packets<br />
with more fragments than the kernel expects.<br />
<br />
Fix this by adding a bounds check before calling skb_add_rx_frag() to<br />
ensure nr_frags does not exceed MAX_SKB_FRAGS.<br />
<br />
The check must be performed before unmapping to avoid a page leak<br />
and double DMA unmap during device teardown.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2a0522f564acd34442652ea083091c329fa7c5d5
- https://git.kernel.org/stable/c/2c0fb0f60bc1545c52da61bc6bd4855c1e7814ba
- https://git.kernel.org/stable/c/af4b8577d0b388cc3d0039eb0cdd9ca5bbbc9276
- https://git.kernel.org/stable/c/f0813bcd2d9d97fdbdf2efb9532ab03ae92e99e6
- https://git.kernel.org/stable/c/f9747a7521a48afded5bff2faf1f2dcfff48c577



