Impact
The Linux kernel’s CDC NCM driver performs an improper validation of the Network Data Packet (NDP) header and its Data Packet Entry (DPE) array. When the NDP is located near the end of the Non‑Temporal Buffer (NTB), the driver checks only the NDP size but neglects the offset before validating the DPE array size. This mis‑calculation can allow memory reads beyond the end of the packet buffer, exposing kernel memory contents. The out‑of‑bounds read occurs during packet processing and can result in information disclosure or a crash.
Affected Systems
All Linux kernel builds that enable the CDC‑NCM USB network interface are affected. The vulnerability is present in any kernel revision prior to the commit that corrected the bounds check; specific upstream version ranges are not listed in the advisory.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, while the EPSS score of less than 1% and absence from the CISA KEV catalog suggest low exploitation likelihood. The flaw requires the attacker to provide a malicious USB packet to a device presenting a CDC‑NCM interface, implying local or physically trusted access rather than a purely remote exploit. Even if exploited, the impact is limited to memory disclosure or local denial of service, without privilege escalation.
OpenCVE Enrichment
Debian DSA