Home

Description

In the Linux kernel, the following vulnerability has been resolved: net: usb: cdc-phonet: fix skb frags[] overflow in rx_complete() A malicious USB device claiming to be a CDC Phonet modem can overflow the skb_shared_info->frags[] array by sending an unbounded sequence of full-page bulk transfers. Drop the skb and increment the length error when the frag limit is reached. This matches the same fix that commit f0813bcd2d9d ("net: wwan: t7xx: fix potential skb->frags overflow in RX path") did for the t7xx driver.

PUBLISHED Reserved 2026-03-09 | Published 2026-04-24 | Updated 2026-04-27 | Assigner Linux

Product status

Default status
unaffected

87cf65601e1709e57f7e28f0f7b3eb0a992c1782 (git) before d4e1946bea8d6441835eb3fd09b19237ba366a6f
affected

87cf65601e1709e57f7e28f0f7b3eb0a992c1782 (git) before a23b1b1aaf41e174181d5853a70e65d4d01e648c
affected

87cf65601e1709e57f7e28f0f7b3eb0a992c1782 (git) before c183d5775129a0a7495bd61a6e57ec230dcf01e5
affected

87cf65601e1709e57f7e28f0f7b3eb0a992c1782 (git) before ebf75c6301c4972a87542ebf2d994c6391eb5d46
affected

87cf65601e1709e57f7e28f0f7b3eb0a992c1782 (git) before 9989938d13cc5ba8447eeed5a61acfcf61bc6801
affected

87cf65601e1709e57f7e28f0f7b3eb0a992c1782 (git) before 600dc40554dc5ad1e6f3af51f700228033f43ea7
affected

Default status
affected

2.6.31
affected

Any version before 2.6.31
unaffected

6.6.136 (semver)
unaffected

6.12.83 (semver)
unaffected

6.18.24 (semver)
unaffected

6.19.14 (semver)
unaffected

7.0.1 (semver)
unaffected

7.1-rc1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/d4e1946bea8d6441835eb3fd09b19237ba366a6f

git.kernel.org/...c/a23b1b1aaf41e174181d5853a70e65d4d01e648c

git.kernel.org/...c/c183d5775129a0a7495bd61a6e57ec230dcf01e5

git.kernel.org/...c/ebf75c6301c4972a87542ebf2d994c6391eb5d46

git.kernel.org/...c/9989938d13cc5ba8447eeed5a61acfcf61bc6801

git.kernel.org/...c/600dc40554dc5ad1e6f3af51f700228033f43ea7

cve.org (CVE-2026-31623)

nvd.nist.gov (CVE-2026-31623)

Download JSON