Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2916 articles · 109748 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-31412EXPLOITEDPATCHED
Linux · Linux

usb: gadget: f_mass_storage: Fix potential integer overflow in check_command_size_in_blocks()

Description

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_mass_storage: Fix potential integer overflow in check_command_size_in_blocks() The `check_command_size_in_blocks()` function calculates the data size in bytes by left shifting `common->data_size_from_cmnd` by the block size (`common->curlun->blkbits`). However, it does not validate whether this shift operation will cause an integer overflow. Initially, the block size is set up in `fsg_lun_open()` , and the `common->data_size_from_cmnd` is set up in `do_scsi_command()`. During initialization, there is no integer overflow check for the interaction between two variables. So if a malicious USB host sends a SCSI READ or WRITE command requesting a large amount of data (`common->data_size_from_cmnd`), the left shift operation can wrap around. This results in a truncated data size, which can bypass boundary checks and potentially lead to memory corruption or out-of-bounds accesses. Fix this by using the check_shl_overflow() macro to safely perform the shift and catch any overflows.

Affected Products

VendorProductVersions
LinuxLinux144974e7f9e32b53b02f6c8632be45d8f43d6ab5, 144974e7f9e32b53b02f6c8632be45d8f43d6ab5, 144974e7f9e32b53b02f6c8632be45d8f43d6ab5, 144974e7f9e32b53b02f6c8632be45d8f43d6ab5, 144974e7f9e32b53b02f6c8632be45d8f43d6ab5, 144974e7f9e32b53b02f6c8632be45d8f43d6ab5, 3.3

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
linuxlinuxmitre_affected90%
open sourcelinux kernelcert_advisory90%

References

  • https://git.kernel.org/stable/c/91817ad5452defe69bc7bc0e355f0ed5d01125cc
  • https://git.kernel.org/stable/c/ce0caaed5940162780c5c223b8ae54968a5f059b
  • https://git.kernel.org/stable/c/228b37936376143f4b60cc6828663f6eaceb81b5
  • https://git.kernel.org/stable/c/3428dc5520c811e66622b2f5fa43341bf9a1f8b3
  • https://git.kernel.org/stable/c/387ebb0453b99d71491419a5dc4ab4bee0cacbac
  • https://git.kernel.org/stable/c/8479891d1f04a8ce55366fe4ca361ccdb96f02e1

Related News (2 articles)

Tier B
BSI Advisories2h ago
[NEU] [mittel] Linux Kernel: Schwachstelle ermöglicht Denial of Service oder Codeausführung
→ No new info (linked only)
Tier C
Linux Kernel CVEs3h ago
CVE-2026-31412: usb: gadget: f_mass_storage: Fix potential integer overflow in check_command_size_in_blocks()
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
91817ad5452defe69bc7bc0e355f0ed5d01125ccce0caaed5940162780c5c223b8ae54968a5f059b228b37936376143f4b60cc6828663f6eaceb81b53428dc5520c811e66622b2f5fa43341bf9a1f8b3387ebb0453b99d71491419a5dc4ab4bee0cacbac8479891d1f04a8ce55366fe4ca361ccdb96f02e106.1.1676.6.1306.12.786.18.196.19.97.0-rc4
PublishedApr 10, 2026
Last enriched2h agov3
Trending Score58
Source articles2
Independent2
Info Completeness9/14
Missing: cvss, epss, cwe, kev, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-23406EXP
apparmor: fix side-effect bug in match_char() macro usage
Trending: 65
HIGHCVE-2026-23400EXP
In the Linux kernel, the following vulnerability has been resolved: rust_binder: call set_notification_done() without proc lock Consider the following sequence of events on a death listener: 1. The
Trending: 63
HIGHCVE-2026-23398EXP
In the Linux kernel, the following vulnerability has been resolved: icmp: fix NULL pointer dereference in icmp_tag_validation() icmp_tag_validation() unconditionally dereferences the result of rcu_d
Trending: 59
HIGHCVE-2025-71086
In the Linux kernel, the following vulnerability has been resolved: net: rose: fix invalid array index in rose_kill_by_device() rose_kill_by_device() collects sockets into a local array[] and then i
Trending: 39
HIGHCVE-2025-71078
In the Linux kernel, the following vulnerability has been resolved: powerpc/64s/slb: Fix SLB multihit issue during SLB preload On systems using the hash MMU, there is a software SLB preload cache th
Trending: 39

Pin to Dashboard

Verification

State: verified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 10, 2026
Discovered by ZDM
Apr 10, 2026
Updated: iocs
Apr 10, 2026
Actively Exploited
Apr 10, 2026
Exploit Available
Apr 10, 2026
Patch Available
Apr 10, 2026
Updated: severity, exploitAvailable, activelyExploited
Apr 10, 2026

Version History

v3
Last enriched 2h ago
v3Tier B2h ago

Updated severity to HIGH and marked the vulnerability as actively exploited with an exploit available.

severityexploitAvailableactivelyExploited
via BSI Advisories
v2Tier C2h ago

Added CVE-2026-31412, updated description with more technical detail, and provided a list of patch URLs.

iocs
via Linux Kernel CVEs
v12h ago

Initial creation