In the Linux kernel, the following vulnerability has been resolved: net/x25: Fix overflow when accumulating packets Add a check to ensure that `x25_sock.fraglen` does not overflow. The `fraglen` also needs to be resetted when purging `fragment_queue` in `x25_clear_queues()`.
https://git.kernel.org/stable/c/f953f11ccf4afe6feb635c08145f4240d9a6b544
https://git.kernel.org/stable/c/a1822cb524e89b4cd2cf0b82e484a2335496a6d9
https://git.kernel.org/stable/c/8c92969c197b91c134be27dc3afb64ab468853a9
https://git.kernel.org/stable/c/6e568835ea54a3e1d08e310e34f95d434e739477
https://git.kernel.org/stable/c/4e2d1bcef78d21247fe8fef13bc7ed95885df2b5
https://git.kernel.org/stable/c/1734bd85c5e0a7a801295b729efb56b009cb8fc3