| Summary | In the Linux kernel, the following vulnerability has been resolved: net: wwan: t7xx: validate port_count against message length in t7xx_port_enum_msg_handler t7xx_port_enum_msg_handler() uses the modem-supplied port_count field as Add a sizeof(*port_msg) check before accessing the port message header Add a struct_size() check after extracting port_count and before the loop. In t7xx_parse_host_rt_data(), guard the rt_feature header read with a Pass msg_len from both call sites: skb->len at the DPMAIF path after |
|---|---|
| Publication Date | May 21, 2026, 10:16 p.m. |
| Registration Date | May 22, 2026, 4:07 a.m. |
| Last Update | May 21, 2026, 10:16 p.m. |