Open mend-bolt-for-github[bot] opened 4 months ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2024-35915 - Medium Severity Vulnerability
Vulnerable Library - linuxlinux-4.19.87
The Linux Kernel
Library home page: https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux
Found in HEAD commit: 57e05824dcb3cd61bc82b1e93e4409de26d2caba
Found in base branch: master
Vulnerable Source Files (2)
/net/nfc/nci/core.c /net/nfc/nci/core.c
Vulnerability Details
In the Linux kernel, the following vulnerability has been resolved: nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet syzbot reported the following uninit-value access issue [1][2]: nci_rx_work() parses and processes received packet. When the payload length is zero, each message type handler reads uninitialized payload and KMSAN detects this issue. The receipt of a packet with a zero-size payload is considered unexpected, and therefore, such packets should be silently discarded. This patch resolved this issue by checking payload size before calling each message type handler codes.
Publish Date: 2024-05-19
URL: CVE-2024-35915
CVSS 3 Score Details (5.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://lore.kernel.org/linux-cve-announce/2024051957-CVE-2024-35915-aead@gregkh/T/#u
Release Date: 2024-05-19
Fix Resolution: v4.19.312,v5.4.274,v5.10.215,v5.15.154,v6.1.85,v6.6.26,v6.8.5,v6.9
Step up your Open Source Security Game with Mend here