Description
In the Linux kernel, the following vulnerability has been resolved:

net: nfc: nci: Fix parameter validation for packet data

Since commit 9c328f54741b ("net: nfc: nci: Add parameter validation for
packet data") communication with nci nfc chips is not working any more.

The mentioned commit tries to fix access of uninitialized data, but
failed to understand that in some cases the data packet is of variable
length and can therefore not be compared to the maximum packet length
given by the sizeof(struct).
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the Linux kernel’s NFC NCI driver improperly validates packet data, particularly for variable-length packets. The validation logic compares packet contents to the size of a fixed struct, causing misinterpretation when packets exceed the expected limits. This leads to a failure of NFC communication, effectively disabling the driver and resulting in a denial of service.

Affected Systems

The vulnerability affects any Linux system running a kernel version prior to the commit that introduced proper validation for NFC NCI packet data. It is relevant to all distributions that ship the kernel with the unpatched NCI driver, regardless of specific distribution or hardware model, as long as the NFC NCI driver is enabled.

Risk and Exploitability

Attackers would need the ability to inject malformed NFC packets through the NFC interface. If an attacker can send crafted packets, the driver will fail, disrupting NFC functionality. No publicly known exploits exist, the EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, indicating a low but non-zero risk of exploitation.

Generated by OpenCVE AI on May 9, 2026 at 04:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a release that includes the patch commit 9c328f54741b, which adds proper validation for NFC NCI packet data.
  • If a kernel upgrade is not feasible, temporarily disable the NFC NCI driver by unloading the module or disabling the associated kernel configuration options to prevent communication with NFC chips.
  • Continuously monitor NFC-related logs and packet captures for abnormal packet sizes or frequent disconnections that could indicate attempted exploitation.

Generated by OpenCVE AI on May 9, 2026 at 04:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 03:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Sat, 09 May 2026 00:15:00 +0000


Fri, 08 May 2026 16:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Fri, 08 May 2026 13:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net: nfc: nci: Fix parameter validation for packet data Since commit 9c328f54741b ("net: nfc: nci: Add parameter validation for packet data") communication with nci nfc chips is not working any more. The mentioned commit tries to fix access of uninitialized data, but failed to understand that in some cases the data packet is of variable length and can therefore not be compared to the maximum packet length given by the sizeof(struct).
Title net: nfc: nci: Fix parameter validation for packet data
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T13:11:15.312Z

Reserved: 2026-05-01T14:12:55.999Z

Link: CVE-2026-43291

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T14:16:36.120

Modified: 2026-05-08T14:16:36.120

Link: CVE-2026-43291

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43291 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T05:00:10Z

Weaknesses