CVE-2023-52507

In the Linux kernel, the following vulnerability has been resolved: nfc: nci: assert requested protocol is valid The protocol is used in a bit mask to determine if the protocol is supported. Assert the provided protocol is less than the maximum defined so it doesn't potentially perform a shift-out-of-bounds and provide a clearer error for undefined protocols vs unsupported ones.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:*

History

13 Jan 2025, 18:51

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213 - () https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213 - Patch
References () https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53 - () https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53 - Patch
References () https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0 - () https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0 - Patch
References () https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da - () https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da - Patch
References () https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848 - () https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848 - Patch
References () https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb - () https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb - Patch
References () https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802 - () https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802 - Patch
References () https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729 - () https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729 - Patch
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*
CWE CWE-125
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1

21 Nov 2024, 08:39

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfc: nci: afirmar que el protocolo solicitado es válido El protocolo se utiliza en una máscara de bits para determinar si el protocolo es compatible. Afirme que el protocolo proporcionado es menor que el máximo definido para que no realice potencialmente un desplazamiento fuera de los límites y proporcione un error más claro para los protocolos no definidos frente a los no compatibles.
References () https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213 - () https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213 -
References () https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53 - () https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53 -
References () https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0 - () https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0 -
References () https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da - () https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da -
References () https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848 - () https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848 -
References () https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb - () https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb -
References () https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802 - () https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802 -
References () https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729 - () https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729 -

02 Mar 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-02 22:15

Updated : 2025-01-13 18:51


NVD link : CVE-2023-52507

Mitre link : CVE-2023-52507

CVE.ORG link : CVE-2023-52507


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read