CVE-2026-23447
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/04/2026
Last modified:
23/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: usb: cdc_ncm: add ndpoffset to NDP32 nframes bounds check<br />
<br />
The same bounds-check bug fixed for NDP16 in the previous patch also<br />
exists in cdc_ncm_rx_verify_ndp32(). The DPE array size is validated<br />
against the total skb length without accounting for ndpoffset, allowing<br />
out-of-bounds reads when the NDP32 is placed near the end of the NTB.<br />
<br />
Add ndpoffset to the nframes bounds check and use struct_size_t() to<br />
express the NDP-plus-DPE-array size more clearly.<br />
<br />
Compile-tested only.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.14.317 (including) | 4.15 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19.285 (including) | 4.20 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4.245 (including) | 5.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.7.1 (including) | 6.6.130 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.78 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.20 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.7:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/125f932a76a97904ef8a555f1dd53e5d0e288c54
- https://git.kernel.org/stable/c/77914255155e68a20aa41175edeecf8121dac391
- https://git.kernel.org/stable/c/a5bd5a2710310c965ea4153cba4210988a3454e2
- https://git.kernel.org/stable/c/af0d1613d6751489dbf9f69aac1123f0b1e566e5
- https://git.kernel.org/stable/c/de70da1fb1d152e981ecb3157f7ec2b633005c16



