Description
In the Linux kernel, the following vulnerability has been resolved:

nfc: s3fwrn5: allocate rx skb before consuming bytes

s3fwrn82_uart_read() reports the number of accepted bytes to the serdev
core. The current code consumes bytes into recv_skb and may already
deliver a complete frame before allocating a fresh receive buffer.

If that alloc_skb() fails, the callback returns 0 even though it has
already consumed bytes, and it leaves recv_skb as NULL for the next
receive callback. That breaks the receive_buf() accounting contract and
can also lead to a NULL dereference on the next skb_put_u8().

Allocate the receive skb lazily before consuming the next byte instead.
If allocation fails, return the number of bytes already accepted.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Linux NFC s3fwrn5 driver fails to properly handle allocation failures. When a call to alloc_skb() returns NULL, the driver still reports that a frame has been consumed and may leave the receive buffer pointer as NULL. The next use of skb_put_u8() dereferences this NULL pointer, causing a kernel panic. This results in a system crash and loss of availability for the affected host.

Affected Systems

All Linux kernel implementations that include the NFC s3fwrn5 driver are affected, regardless of vendor. The vulnerability is present in the mainline kernel until a patch that lazily allocates the receive skb before consuming bytes is applied. No specific version information is provided, so any kernel version that ships a version of the driver that contains the flaw is impacted.

Risk and Exploitability

The exploit environment requires the attacker to be able to generate or influence NFC data processed by the s3fwrn5 driver. The exact attack vector – whether local, network, or physical – is not explicitly detailed but the kernel-level nature of the flaw suggests a local or remote application with access to the NFC device could trigger it. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, indicating no known widespread exploitation. Nonetheless, a successful NULL‑dereference results in a kernel panic, so the impact is a denial‑of‑service of the affected machine.

Generated by OpenCVE AI on May 6, 2026 at 11:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a release that includes the fix (e.g., integrates commit 09822d3d6f68a0cdc4626e0c507324a4927f55a9).
  • If an immediate kernel upgrade cannot be performed, disable the NFC s3fwrn5 driver by removing or blacklisting the module or by disabling the NFC hardware in the system.
  • Restrict access to NFC devices by configuring appropriate capabilities or ACLs so that only trusted processes can interact with the driver.
  • Monitor system logs for kernel panic events related to NFC to detect potential exploitation attempts.

Generated by OpenCVE AI on May 6, 2026 at 11:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 12:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Wed, 06 May 2026 09:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: nfc: s3fwrn5: allocate rx skb before consuming bytes s3fwrn82_uart_read() reports the number of accepted bytes to the serdev core. The current code consumes bytes into recv_skb and may already deliver a complete frame before allocating a fresh receive buffer. If that alloc_skb() fails, the callback returns 0 even though it has already consumed bytes, and it leaves recv_skb as NULL for the next receive callback. That breaks the receive_buf() accounting contract and can also lead to a NULL dereference on the next skb_put_u8(). Allocate the receive skb lazily before consuming the next byte instead. If allocation fails, return the number of bytes already accepted.
Title nfc: s3fwrn5: allocate rx skb before consuming bytes
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T07:40:28.845Z

Reserved: 2026-05-01T14:12:55.984Z

Link: CVE-2026-43098

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-06T10:16:23.250

Modified: 2026-05-06T10:16:23.250

Link: CVE-2026-43098

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T12:15:03Z

Weaknesses