Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: nfc: nci: Fix uninit-value in nci_rx_work syzbot reported the following uninit-value access issue [1] nci_rx_work() parses received packet from ndev->rx_q. It should be validated header size, payload size and total packet size before processing the packet. If an invalid packet is detected, it should be silently discarded.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.19.312, < 4.19.316 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/017ff397624930fd7ac7f1761f3c9d6a7100f68cPatch
- https://git.kernel.org/stable/c/406cfac9debd4a6d3dc5d9258ee086372a8c08b6Patch
- https://git.kernel.org/stable/c/485ded868ed62ceb2acb3a459d7843fd71472619Patch
- https://git.kernel.org/stable/c/ad4d196d2008c7f413167f0a693feb4f0439d7fePatch
- https://git.kernel.org/stable/c/e4a87abf588536d1cdfb128595e6e680af5cf3edPatch
- https://git.kernel.org/stable/c/e53a7f8afcbd2886f2a94c5d56757328109730eaPatch
- https://git.kernel.org/stable/c/e8c8e0d0d214c877fbad555df5b3ed558cd9b0c3Patch
- https://git.kernel.org/stable/c/f80b786ab0550d0020191a59077b2c7e069db2d1Patch
- https://git.kernel.org/stable/c/017ff397624930fd7ac7f1761f3c9d6a7100f68cPatch
- https://git.kernel.org/stable/c/406cfac9debd4a6d3dc5d9258ee086372a8c08b6Patch
- https://git.kernel.org/stable/c/485ded868ed62ceb2acb3a459d7843fd71472619Patch
- https://git.kernel.org/stable/c/ad4d196d2008c7f413167f0a693feb4f0439d7fePatch
- https://git.kernel.org/stable/c/e4a87abf588536d1cdfb128595e6e680af5cf3edPatch
- https://git.kernel.org/stable/c/e53a7f8afcbd2886f2a94c5d56757328109730eaPatch
- https://git.kernel.org/stable/c/e8c8e0d0d214c877fbad555df5b3ed558cd9b0c3Patch
FAQ
What is CVE-2024-38381?
CVE-2024-38381 is a vulnerability with a CVSS score of 7.1 (HIGH). In the Linux kernel, the following vulnerability has been resolved: nfc: nci: Fix uninit-value in nci_rx_work syzbot reported the following uninit-value access issue [1] nci_rx_work() parses receiv...
How severe is CVE-2024-38381?
CVE-2024-38381 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-38381?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.