Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: nfc: nci: assert requested protocol is valid The protocol is used in a bit mask to determine if the protocol is supported. Assert the provided protocol is less than the maximum defined so it doesn't potentially perform a shift-out-of-bounds and provide a clearer error for undefined protocols vs unsupported ones.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 3.2, < 4.14.328 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213Patch
- https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53Patch
- https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0Patch
- https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521daPatch
- https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848Patch
- https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cbPatch
- https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802Patch
- https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729Patch
- https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213Patch
- https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53Patch
- https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0Patch
- https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521daPatch
- https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848Patch
- https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cbPatch
- https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802Patch
FAQ
What is CVE-2023-52507?
CVE-2023-52507 is a vulnerability with a CVSS score of 7.1 (HIGH). In the Linux kernel, the following vulnerability has been resolved: nfc: nci: assert requested protocol is valid The protocol is used in a bit mask to determine if the protocol is supported. Assert ...
How severe is CVE-2023-52507?
CVE-2023-52507 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-52507?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.