Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2024-38381— nfc: nci: Fix uninit-value in nci_rx_work

EPSS 0.01% · P2

Affected Version Matrix 19

VendorProductVersion RangeStatus
LinuxLinux11387b2effbb55f58dc2111ef4b4b896f2756240< 406cfac9debd4a6d3dc5d9258ee086372a8c08b6affected
03fe259649a551d336a7f20919b641ea100e3fff< 485ded868ed62ceb2acb3a459d7843fd71472619affected
755e53bbc61bc1aff90eafa64c8c2464fd3dfa3c< f80b786ab0550d0020191a59077b2c7e069db2d1affected
ac68d9fa09e410fa3ed20fb721d56aa558695e16< ad4d196d2008c7f413167f0a693feb4f0439d7feaffected
b51ec7fc9f877ef869c01d3ea6f18f6a64e831a7< e8c8e0d0d214c877fbad555df5b3ed558cd9b0c3affected
a946ebee45b09294c8b0b0e77410b763c4d2817a< e53a7f8afcbd2886f2a94c5d56757328109730eaaffected
d24b03535e5eb82e025219c2f632b485409c898f< 017ff397624930fd7ac7f1761f3c9d6a7100f68caffected
d24b03535e5eb82e025219c2f632b485409c898f< e4a87abf588536d1cdfb128595e6e680af5cf3edaffected
… +11 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-38381

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
nfc: nci: Fix uninit-value in nci_rx_work
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: nfc: nci: Fix uninit-value in nci_rx_work syzbot reported the following uninit-value access issue [1] nci_rx_work() parses received packet from ndev->rx_q. It should be validated header size, payload size and total packet size before processing the packet. If an invalid packet is detected, it should be silently discarded.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在安全漏洞,该漏洞源于nfc:nci模块nci_rx_work中存在未初始化变量。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 11387b2effbb55f58dc2111ef4b4b896f2756240 ~ 406cfac9debd4a6d3dc5d9258ee086372a8c08b6 -
LinuxLinux 6.9 -

II. Public POCs for CVE-2024-38381

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-38381

登录查看更多情报信息。

Mailing List Discussions for CVE-2024-38381 (1)

Other References for CVE-2024-38381 (8)

Same Patch Batch · Linux · 2024-06-21 · 40 CVEs total

CVE-2024-38636f2fs: multidev: fix to recognize valid zero block address
CVE-2024-38627stm class: Fix a double free in stm_register_device()
CVE-2024-38628usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind.
CVE-2024-38629dmaengine: idxd: Avoid unnecessary destruction of file_ida
CVE-2024-38630watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger
CVE-2024-38631iio: adc: PAC1934: fix accessing out of bounds array index
CVE-2024-38632vfio/pci: fix potential memory leak in vfio_intx_enable()
CVE-2024-38633serial: max3100: Update uart_driver_registered on driver removal
CVE-2024-38634serial: max3100: Lock port->lock when calling uart_handle_cts_change()
CVE-2024-38635soundwire: cadence: fix invalid PDI offset
CVE-2024-38625fs/ntfs3: Check 'folio' pointer for NULL
CVE-2024-38637greybus: lights: check return of get_channel_from_mode
CVE-2024-38659enic: Validate length of nl attributes in enic_set_vf_port
CVE-2024-38662bpf: Allow delete from sockmap/sockhash only if update is allowed
CVE-2024-38780dma-buf/sw-sync: don't enable IRQ from sync_print_obj()
CVE-2024-39277dma-mapping: benchmark: handle NUMA_NO_NODE correctly
CVE-2024-34777dma-mapping: benchmark: fix node id validation
CVE-2024-36288SUNRPC: Fix loop termination condition in gss_free_in_token_pages()
CVE-2024-36477tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer
CVE-2024-36481tracing/probes: fix error check in parse_btf_field()

Showing top 20 of 40 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2024-38381

No comments yet


Leave a comment