CVE-2024-26825

critical

Description

In the Linux kernel, the following vulnerability has been resolved: nfc: nci: free rx_data_reassembly skb on NCI device cleanup rx_data_reassembly skb is stored during NCI data exchange for processing fragmented packets. It is dropped only when the last fragment is processed or when an NTF packet with NCI_OP_RF_DEACTIVATE_NTF opcode is received. However, the NCI device may be deallocated before that which leads to skb leak. As by design the rx_data_reassembly skb is bound to the NCI device and nothing prevents the device to be freed before the skb is processed in some way and cleaned, free it on the NCI device cleanup. Found by Linux Verification Center (linuxtesting.org) with Syzkaller.

References

https://git.kernel.org/stable/c/bfb007aebe6bff451f7f3a4be19f4f286d0d5d9c

https://git.kernel.org/stable/c/a3d90fb5c23f29ba59c04005ae76c5228cef2be9

https://git.kernel.org/stable/c/7e9a8498658b398bf11b8e388005fa54e40aed81

https://git.kernel.org/stable/c/71349abe3aba7fedcab5b3fcd7aa82371fb5ccbf

https://git.kernel.org/stable/c/5c0c5ffaed73cbae6c317374dc32ba6cacc60895

https://git.kernel.org/stable/c/471c9ede8061357b43a116fa692e70d91941ac23

https://git.kernel.org/stable/c/2f6d16f0520d6505241629ee2f5c131b547d5f9d

https://git.kernel.org/stable/c/16d3f507b0fa70453dc54550df093d6e9ac630c1

Details

Source: Mitre, NVD

Published: 2024-04-17

Updated: 2024-04-17

Risk Information

CVSS v2

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Severity: High

CVSS v3

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Severity: Critical