In the Linux kernel, the following vulnerability has been resolved:
nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet
syzbot reported the following uninit-value access issue [1][2]:
nci_rx_work() parses and processes received packet. When the payload
length is zero, each message type handler reads uninitialized payload
and KMSAN detects this issue. The receipt of a packet with a zero-size
payload is considered unexpected, and therefore, such packets should be
silently discarded.
This patch resolved this issue by checking payload size before calling
each message type handler codes.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
03 Feb 2025, 16:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/03fe259649a551d336a7f20919b641ea100e3fff - Patch | |
References | () https://git.kernel.org/stable/c/11387b2effbb55f58dc2111ef4b4b896f2756240 - Patch | |
References | () https://git.kernel.org/stable/c/755e53bbc61bc1aff90eafa64c8c2464fd3dfa3c - Patch | |
References | () https://git.kernel.org/stable/c/8948e30de81faee87eeee01ef42a1f6008f5a83a - Patch | |
References | () https://git.kernel.org/stable/c/a946ebee45b09294c8b0b0e77410b763c4d2817a - Patch | |
References | () https://git.kernel.org/stable/c/ac68d9fa09e410fa3ed20fb721d56aa558695e16 - Patch | |
References | () https://git.kernel.org/stable/c/b51ec7fc9f877ef869c01d3ea6f18f6a64e831a7 - Patch | |
References | () https://git.kernel.org/stable/c/d24b03535e5eb82e025219c2f632b485409c898f - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List | |
CWE | CWE-908 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Linux linux Kernel
Linux Debian debian Linux Debian |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* |
21 Nov 2024, 09:21
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/03fe259649a551d336a7f20919b641ea100e3fff - | |
References | () https://git.kernel.org/stable/c/11387b2effbb55f58dc2111ef4b4b896f2756240 - | |
References | () https://git.kernel.org/stable/c/755e53bbc61bc1aff90eafa64c8c2464fd3dfa3c - | |
References | () https://git.kernel.org/stable/c/8948e30de81faee87eeee01ef42a1f6008f5a83a - | |
References | () https://git.kernel.org/stable/c/a946ebee45b09294c8b0b0e77410b763c4d2817a - | |
References | () https://git.kernel.org/stable/c/ac68d9fa09e410fa3ed20fb721d56aa558695e16 - | |
References | () https://git.kernel.org/stable/c/b51ec7fc9f877ef869c01d3ea6f18f6a64e831a7 - | |
References | () https://git.kernel.org/stable/c/d24b03535e5eb82e025219c2f632b485409c898f - |
05 Nov 2024, 10:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Jun 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
19 May 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-19 09:15
Updated : 2025-02-03 16:09
NVD link : CVE-2024-35915
Mitre link : CVE-2024-35915
CVE.ORG link : CVE-2024-35915
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-908
Use of Uninitialized Resource