Description
In the Linux kernel, the following vulnerability has been resolved:

net: usb: cdc_ncm: add ndpoffset to NDP32 nframes bounds check

The same bounds-check bug fixed for NDP16 in the previous patch also
exists in cdc_ncm_rx_verify_ndp32(). The DPE array size is validated
against the total skb length without accounting for ndpoffset, allowing
out-of-bounds reads when the NDP32 is placed near the end of the NTB.

Add ndpoffset to the nframes bounds check and use struct_size_t() to
express the NDP-plus-DPE-array size more clearly.

Compile-tested only.
Published: 2026-04-03
Score: 7.0 High
EPSS: n/a
KEV: No
Impact: Out-of-bounds Read leading to potential information disclosure
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in the Linux kernel's USB CDC Network Control Model (cdc_ncm) driver. A bounds‑check bug in the function cdc_ncm_rx_verify_ndp32() allows the driver to read beyond the end of a DPE array when an NDP32 frame is positioned near the boundary of the NTB. This out‑of‑bounds read can expose kernel memory contents to a crafted USB device and may lead to information disclosure or kernel panic.

Affected Systems

The affected product is the Linux kernel. Versions that incorporate the buggy driver implementation are unspecified, but any Linux distribution compiling the kernel from sources that include the pre‑patch code lacks protection. Users of standard kernel releases released before the fix are potentially impacted.

Risk and Exploitability

No CVSS score or EPSS data is provided, so the quantified severity and likelihood remain unknown. Based on the description, a local attacker with physical access could supply a malicious USB device that sends an NDP32 packet near the NTB boundary to trigger the out‑of‑bounds read. The exploit requires the vulnerable driver to be loaded and the device to be connected, making it a local USB‑based attack vector. The risk is mitigated once the kernel is updated to a patched version that includes bounds‑checking for ndpoffset.

Generated by OpenCVE AI on April 3, 2026 at 18:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply an updated Linux kernel that includes the commit fixing the bounds‑check bug (e.g., 125f932a76a97904ef8a555f1dd53e5d0e288c54).
  • If a kernel update is not immediately available, disable or unload the cdc_ncm module or block the USB device from connecting to the host.
  • Verify that the kernel version in use is not among those vulnerable by consulting the vendor’s changelog or security advisories.

Generated by OpenCVE AI on April 3, 2026 at 18:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 04 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-131
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net: usb: cdc_ncm: add ndpoffset to NDP32 nframes bounds check The same bounds-check bug fixed for NDP16 in the previous patch also exists in cdc_ncm_rx_verify_ndp32(). The DPE array size is validated against the total skb length without accounting for ndpoffset, allowing out-of-bounds reads when the NDP32 is placed near the end of the NTB. Add ndpoffset to the nframes bounds check and use struct_size_t() to express the NDP-plus-DPE-array size more clearly. Compile-tested only.
Title net: usb: cdc_ncm: add ndpoffset to NDP32 nframes bounds check
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-03T15:15:30.495Z

Reserved: 2026-01-13T15:37:46.019Z

Link: CVE-2026-23447

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-03T16:16:30.663

Modified: 2026-04-03T16:16:30.663

Link: CVE-2026-23447

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-23447 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:16:05Z

Weaknesses