| Summary | In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_ncm: validate minimum block_len in ncm_unwrap_ntb() The block_len read from the host-supplied NTB header is checked against The same underflow occurs in the datagram index checks against block_len Fix this by rejecting block lengths that cannot hold at least the NTB Commit 8d2b1a1ec9f5 ("CDC-NCM: avoid overflow in sanity checking") fixed |
|---|---|
| Publication Date | April 25, 2026, 12:16 a.m. |
| Registration Date | April 25, 2026, 4:07 a.m. |
| Last Update | April 25, 2026, 2:51 a.m. |