| 概要 | In the Linux kernel, the following vulnerability has been resolved: net: wwan: t7xx: validate port_count against message length in t7xx_port_enum_msg_handler t7xx_port_enum_msg_handler() uses the modem-supplied port_count field as Add a sizeof(*port_msg) check before accessing the port message header Add a struct_size() check after extracting port_count and before the loop. In t7xx_parse_host_rt_data(), guard the rt_feature header read with a Pass msg_len from both call sites: skb->len at the DPMAIF path after |
|---|---|
| 公表日 | 2026年5月21日22:16 |
| 登録日 | 2026年5月22日4:07 |
| 最終更新日 | 2026年5月21日22:16 |