In the Linux kernel, the following vulnerability has been resolved: nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet syzbot reported the following uninit-value access issue [1][2]: nci_rx_work() parses and processes received packet. When the payload length is zero, each message type handler reads uninitialized payload and KMSAN detects this issue. The receipt of a packet with a zero-size payload is considered unexpected, and therefore, such packets should be silently discarded. This patch resolved this issue by checking payload size before calling each message type handler codes.
History

Mon, 03 Feb 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Debian
Debian debian Linux
Linux
Linux linux Kernel
Weaknesses CWE-908
CPEs cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
Vendors & Products Debian
Debian debian Linux
Linux
Linux linux Kernel

Fri, 22 Nov 2024 12:00:00 +0000


Tue, 05 Nov 2024 10:45:00 +0000


cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-05-19T08:35:08.239Z

Updated: 2024-12-19T08:58:11.631Z

Reserved: 2024-05-17T13:50:33.122Z

Link: CVE-2024-35915

cve-icon Vulnrichment

Updated: 2024-08-02T03:21:49.232Z

cve-icon NVD

Status : Analyzed

Published: 2024-05-19T09:15:11.987

Modified: 2025-02-03T16:09:55.723

Link: CVE-2024-35915

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-05-19T00:00:00Z

Links: CVE-2024-35915 - Bugzilla