Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-23172— net: wwan: t7xx: fix potential skb->frags overflow in RX path

CVSS 8.4 · High EPSS 0.02% · P5
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-23172

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
net: wwan: t7xx: fix potential skb->frags overflow in RX path
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: net: wwan: t7xx: fix potential skb->frags overflow in RX path When receiving data in the DPMAIF RX path, the t7xx_dpmaif_set_frag_to_skb() function adds page fragments to an skb without checking if the number of fragments has exceeded MAX_SKB_FRAGS. This could lead to a buffer overflow in skb_shinfo(skb)->frags[] array, corrupting adjacent memory and potentially causing kernel crashes or other undefined behavior. This issue was identified through static code analysis by comparing with a similar vulnerability fixed in the mt76 driver commit b102f0c522cf ("mt76: fix array overflow on receiving too many fragments for a packet"). The vulnerability could be triggered if the modem firmware sends packets with excessive fragments. While under normal protocol conditions (MTU 3080 bytes, BAT buffer 3584 bytes), a single packet should not require additional fragments, the kernel should not blindly trust firmware behavior. Malicious, buggy, or compromised firmware could potentially craft packets with more fragments than the kernel expects. Fix this by adding a bounds check before calling skb_add_rx_frag() to ensure nr_frags does not exceed MAX_SKB_FRAGS. The check must be performed before unmapping to avoid a page leak and double DMA unmap during device teardown.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于未检查片段数量,可能导致缓冲区溢出和内核崩溃。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux d642b012df70a76dd5723f2d426b40bffe83ac49 ~ f9747a7521a48afded5bff2faf1f2dcfff48c577 -
LinuxLinux 5.19 -

II. Public POCs for CVE-2026-23172

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-23172

登录查看更多情报信息。

Same Patch Batch · Linux · 2026-02-14 · 108 CVEs total

CVE-2026-231938.8 HIGHscsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()
CVE-2026-232097.8 HIGHmacvlan: fix error recovery in macvlan_common_newlink()
CVE-2026-231697.8 HIGHmptcp: fix race in mptcp_pm_nl_flush_addrs_doit()
CVE-2026-231717.8 HIGHbonding: fix use-after-free due to enslave fail after slave array update
CVE-2026-231787.8 HIGHHID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report()
CVE-2026-231987.8 HIGHKVM: Don't clobber irqfd routing type when deassigning irqfd
CVE-2026-231847.8 HIGHbinder: fix UAF in binder_netlink_report()
CVE-2026-231857.8 HIGHwifi: iwlwifi: mld: cancel mlo_scan_start_wk
CVE-2026-231917.8 HIGHALSA: aloop: Fix racy access at PCM trigger
CVE-2026-231927.8 HIGHlinkwatch: use __dev_put() in callers to prevent UAF
CVE-2026-231487.5 HIGHnvmet: fix race in nvmet_bio_done() leading to NULL pointer dereference
CVE-2026-231397.5 HIGHnetfilter: nf_conncount: update last_gc only when GC has been performed
CVE-2026-231367.5 HIGHlibceph: reset sparse-read state in osd_fault()
CVE-2026-231617.3 HIGHmm/shmem, swap: fix race of truncate and swap entry split
CVE-2026-232047.1 HIGHnet/sched: cls_u32: use skb_header_pointer_careful()
CVE-2026-231807.0 HIGHdpaa2-switch: add bounds check for if_id in IRQ handler
CVE-2026-231757.0 HIGHnet: cpsw: Execute ndo_set_rx_mode callback in a work queue
CVE-2026-231957.0 HIGHcgroup/dmem: avoid pool UAF
CVE-2026-23115serial: Fix not set tty->port race condition
CVE-2026-23142mm/damon/sysfs-scheme: cleanup access_pattern subdirs on scheme dir setup failure

Showing top 20 of 108 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2026-23172

No comments yet


Leave a comment