← Back to home
wid-sec-w-2026-1049  ·  Published 2026-04-09  ·  View on BSI CERT-Bund ↗

Linux Kernel: Vulnerability allows Denial of Service or Code execution

CVSS N/A NONE

Risk Summary

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_mass_storage: Fix potential integer overflow in check_command_size_in_blocks() The `check_command_size_in_blocks()` function calculates the data size in bytes by left shifting `common->data_size_from_cmnd` by the block size (`common->curlun->blkbits`). However, it does not validate whether this shift operation will cause an integer overflow. Initially, the block size is set up in `fsg_lun_open()` , and the `common->data_size_from_cmnd` is set up in `do_scsi_command()`. During initialization, there is no integer overflow check for the interaction between two variables. So if a malicious USB host sends a SCSI READ or WRITE command requesting a large amount of data (`common->data_size_from_cmnd`), the left shift operation can wrap around. This results in a truncated data size, which can bypass boundary checks and potentially lead to memory corruption or out-of-bounds accesses. Fix this by using the check_shl_overflow() macro to safely perform the shift and catch any overflows.

CVEs (1)

Affected Vendors

Open Source

Affected Products (12)

Open Source · Linux Kernel <6.1.167
Open Source · Linux Kernel 6.1.167
Open Source · Linux Kernel <6.6.130
Open Source · Linux Kernel 6.6.130
Open Source · Linux Kernel <6.12.78
Open Source · Linux Kernel 6.12.78
Open Source · Linux Kernel <6.18.19
Open Source · Linux Kernel 6.18.19
Open Source · Linux Kernel <6.19.9
Open Source · Linux Kernel 6.19.9
Open Source · Linux Kernel <7.0-rc4
Open Source · Linux Kernel 7.0-rc4

Get alerted to advisories like this

OTWarden monitors CISA, BSI, Siemens, Rockwell and more — and emails you within 2 hours when your vendors are affected.

Start free trial Learn more