Bug 2454838 (CVE-2026-23447) - CVE-2026-23447 kernel: net: usb: cdc_ncm: add ndpoffset to NDP32 nframes bounds check
Summary: CVE-2026-23447 kernel: net: usb: cdc_ncm: add ndpoffset to NDP32 nframes boun...
Keywords:
Status: NEW
Alias: CVE-2026-23447
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-03 16:03 UTC by OSIDB Bzimport
Modified: 2026-04-03 18:18 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-03 16:03:32 UTC
In the Linux kernel, the following vulnerability has been resolved:

net: usb: cdc_ncm: add ndpoffset to NDP32 nframes bounds check

The same bounds-check bug fixed for NDP16 in the previous patch also
exists in cdc_ncm_rx_verify_ndp32(). The DPE array size is validated
against the total skb length without accounting for ndpoffset, allowing
out-of-bounds reads when the NDP32 is placed near the end of the NTB.

Add ndpoffset to the nframes bounds check and use struct_size_t() to
express the NDP-plus-DPE-array size more clearly.

Compile-tested only.


Note You need to log in before you can comment on or make changes to this bug.