In the Linux kernel, the following vulnerability has been resolved:
NFC: nci: Bounds check struct nfc_target arrays
While running under CONFIG_FORTIFY_SOURCE=y, syzkaller reported:
memcpy: detected field-spanning write (size 129) of single field "target->sensf_res" at net/nfc/nci/ntf.c:260 (size 18)
This appears to be a legitimate lack of bounds checking in
nci_add_new_protocol(). Add the missing checks.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-10-21 20:15
Updated : 2024-10-25 21:27
NVD link : CVE-2022-48967
Mitre link : CVE-2022-48967
CVE.ORG link : CVE-2022-48967
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-129
Improper Validation of Array Index