CVE-2026-43291

medium

Description

In the Linux kernel, the following vulnerability has been resolved: net: nfc: nci: Fix parameter validation for packet data Since commit 9c328f54741b ("net: nfc: nci: Add parameter validation for packet data") communication with nci nfc chips is not working any more. The mentioned commit tries to fix access of uninitialized data, but failed to understand that in some cases the data packet is of variable length and can therefore not be compared to the maximum packet length given by the sizeof(struct).

References

https://git.kernel.org/stable/c/f5218426f765eee22e178df9c126d974792fb6a5

https://git.kernel.org/stable/c/c692db813a7e3b7c3c17d6e9a3ad2a018bf1142b

https://git.kernel.org/stable/c/ad058a4317db7fdb3f09caa6ed536d24a62ce6a0

https://git.kernel.org/stable/c/a24a8a582da4426b2042e510a1080df84083b51d

https://git.kernel.org/stable/c/571dcbeb8e635182bb825ae758399831805693c2

https://git.kernel.org/stable/c/498fc5d0d650c77e87fcc73808d4f43240c21805

https://git.kernel.org/stable/c/3b91160e9a91b5a2662875417dc42dc5b0bf03ea

Details

Source: Mitre, NVD

Published: 2026-05-08

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium