CVE-2025-40043
BaseFortify
Publication date: 2025-10-28
Last updated on: 2025-10-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's NFC (Near Field Communication) subsystem involves insufficient validation of packet data sizes. Specifically, the function nic_valid_size() only checks the packet length against the buffer length but does not fully validate the packet contents. This can lead to processing uninitialized memory in skb_buff->data, causing potential memory access issues. The fix adds better parameter validation and silently drops invalid packets to prevent such issues.
How can this vulnerability impact me? :
The vulnerability can cause the Linux kernel to process uninitialized memory, which may lead to unpredictable behavior such as kernel crashes, memory corruption, or denial of service. Additionally, because invalid packets are silently dropped, requests may timeout and generate excessive log messages, potentially impacting system stability and performance.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved by adding parameter validation for packet data in the Linux kernel NFC NCI subsystem. Immediate mitigation would involve updating the Linux kernel to a version that includes this fix to ensure proper validation and prevent processing of uninitialized memory. Additionally, monitoring dmesg logs for excessive timeouts related to nci_request may help identify issues until the fix is applied.