First published: Wed Apr 17 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: nfc: nci: free rx_data_reassembly skb on NCI device cleanup rx_data_reassembly skb is stored during NCI data exchange for processing fragmented packets. It is dropped only when the last fragment is processed or when an NTF packet with NCI_OP_RF_DEACTIVATE_NTF opcode is received. However, the NCI device may be deallocated before that which leads to skb leak. As by design the rx_data_reassembly skb is bound to the NCI device and nothing prevents the device to be freed before the skb is processed in some way and cleaned, free it on the NCI device cleanup. Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=3.2<4.19.307 | |
Linux Kernel | >=4.20<5.4.269 | |
Linux Kernel | >=5.5<5.10.210 | |
Linux Kernel | >=5.11<5.15.149 | |
Linux Kernel | >=5.16<6.1.79 | |
Linux Kernel | >=6.2<6.6.18 | |
Linux Kernel | >=6.7<6.7.6 | |
Linux Kernel | =6.8-rc1 | |
Linux Kernel | =6.8-rc2 | |
Debian Linux | =10.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.22-1 6.12.25-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26825 has a moderate severity score indicating potential impact on data integrity during NCI data exchange.
To fix CVE-2024-26825, update the Linux kernel to versions 5.10.223-1, 5.10.226-1, 6.1.123-1, 6.1.119-1, 6.12.10-1, or 6.12.11-1.
CVE-2024-26825 affects the Linux kernel in multiple versions as specified in the vulnerability details.
CVE-2024-26825 was disclosed as part of ongoing security assessments of the Linux kernel.
CVE-2024-26825 affects the handling of reassembly of fragmented packets during NCI data exchange.