In the Linux kernel, the following vulnerability has been resolved:
nfc: nci: assert requested protocol is valid
The protocol is used in a bit mask to determine if the protocol is
supported. Assert the provided protocol is less than the maximum
defined so it doesn't potentially perform a shift-out-of-bounds and
provide a clearer error for undefined protocols vs unsupported ones.
References
Configurations
Configuration 1 (hide)
|
History
13 Jan 2025, 18:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213 - Patch | |
References | () https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53 - Patch | |
References | () https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0 - Patch | |
References | () https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da - Patch | |
References | () https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848 - Patch | |
References | () https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb - Patch | |
References | () https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802 - Patch | |
References | () https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729 - Patch | |
First Time |
Linux
Linux linux Kernel |
|
CPE | cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:* |
|
CWE | CWE-125 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
21 Nov 2024, 08:39
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213 - | |
References | () https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53 - | |
References | () https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0 - | |
References | () https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da - | |
References | () https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848 - | |
References | () https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb - | |
References | () https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802 - | |
References | () https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729 - |
02 Mar 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-02 22:15
Updated : 2025-01-13 18:51
NVD link : CVE-2023-52507
Mitre link : CVE-2023-52507
CVE.ORG link : CVE-2023-52507
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read