Description
In the Linux kernel, the following vulnerability has been resolved:

net: usb: cdc_ncm: add ndpoffset to NDP16 nframes bounds check

cdc_ncm_rx_verify_ndp16() validates that the NDP header and its DPE
entries fit within the skb. The first check correctly accounts for
ndpoffset:

if ((ndpoffset + sizeof(struct usb_cdc_ncm_ndp16)) > skb_in->len)

but the second check omits it:

if ((sizeof(struct usb_cdc_ncm_ndp16) +
ret * (sizeof(struct usb_cdc_ncm_dpe16))) > skb_in->len)

This validates the DPE array size against the total skb length as if
the NDP were at offset 0, rather than at ndpoffset. When the NDP is
placed near the end of the NTB (large wNdpIndex), the DPE entries can
extend past the skb data buffer even though the check passes.
cdc_ncm_rx_fixup() then reads out-of-bounds memory when iterating
the DPE array.

Add ndpoffset to the nframes bounds check and use struct_size_t() to
express the NDP-plus-DPE-array size more clearly.
Published: 2026-04-03
Score: 5.5 Medium
EPSS: n/a
KEV: No
Impact: Out-of-bounds Read
Action: Immediate Patch
AI Analysis

Impact

The Linux kernel flaw in the cdc_ncm_rx_verify_ndp16 routine performs a bounds check that fails to incorporate the ndpoffset when validating the DPE array length. As a result the code may read beyond the end of the socket buffer, leaking kernel data in an out‑of‑bounds read. This could expose sensitive kernel memory to an attacker and may lead to crashes or, in a larger exploit chain, privilege escalation or denial of service.

Affected Systems

All Linux kernel releases before the switch that adds ndpoffset to the NDP‑plus‑DPE bounds check are affected. The issue appears in the standard kernel code that handles USB CDC NCM devices and is present across the major distribution builds that ship the mainline kernel.

Risk and Exploitability

The vulnerability requires an attacker to supply a malicious USB CDC NCM device to the affected system; EPSS data are not available and the vulnerability is not listed in the CISA KEV catalog, however the potential for information disclosure and kernel instability indicates a high severity. The patch that adds the offset to the bounds check and uses struct_size_t resolves the problem and is the recommended mitigation.

Generated by OpenCVE AI on April 3, 2026 at 18:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Linux kernel update that includes the fix for net: usb: cdc_ncm: add ndpoffset to NDP16 nframes bounds check.
  • If a kernel upgrade is not immediately possible, disable CDC NCM USB support by removing or blacklisting the related module.
  • Verify the running kernel version after patching to confirm that the vulnerability is remediated.

Generated by OpenCVE AI on April 3, 2026 at 18:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 04 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1285
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125
CWE-400

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net: usb: cdc_ncm: add ndpoffset to NDP16 nframes bounds check cdc_ncm_rx_verify_ndp16() validates that the NDP header and its DPE entries fit within the skb. The first check correctly accounts for ndpoffset: if ((ndpoffset + sizeof(struct usb_cdc_ncm_ndp16)) > skb_in->len) but the second check omits it: if ((sizeof(struct usb_cdc_ncm_ndp16) + ret * (sizeof(struct usb_cdc_ncm_dpe16))) > skb_in->len) This validates the DPE array size against the total skb length as if the NDP were at offset 0, rather than at ndpoffset. When the NDP is placed near the end of the NTB (large wNdpIndex), the DPE entries can extend past the skb data buffer even though the check passes. cdc_ncm_rx_fixup() then reads out-of-bounds memory when iterating the DPE array. Add ndpoffset to the nframes bounds check and use struct_size_t() to express the NDP-plus-DPE-array size more clearly.
Title net: usb: cdc_ncm: add ndpoffset to NDP16 nframes bounds check
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-03T15:15:31.488Z

Reserved: 2026-01-13T15:37:46.020Z

Link: CVE-2026-23448

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-03T16:16:30.863

Modified: 2026-04-03T16:16:30.863

Link: CVE-2026-23448

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-23448 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:16:04Z

Weaknesses