CVE-2026-43291 PUBLISHED

net: nfc: nci: Fix parameter validation for packet data

Assigner: Linux
Reserved: 01.05.2026 Published: 08.05.2026 Updated: 08.05.2026

In the Linux kernel, the following vulnerability has been resolved:

net: nfc: nci: Fix parameter validation for packet data

Since commit 9c328f54741b ("net: nfc: nci: Add parameter validation for packet data") communication with nci nfc chips is not working any more.

The mentioned commit tries to fix access of uninitialized data, but failed to understand that in some cases the data packet is of variable length and can therefore not be compared to the maximum packet length given by the sizeof(struct).

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 8fcc7315a10a84264e55bb65ede10f0af20a983f to a24a8a582da4426b2042e510a1080df84083b51d (excl.)
  • affected from bfdda0123dde406dbff62e7e9136037e97998a15 to f5218426f765eee22e178df9c126d974792fb6a5 (excl.)
  • affected from 0ba68bea1e356f466ad29449938bea12f5f3711f to ad058a4317db7fdb3f09caa6ed536d24a62ce6a0 (excl.)
  • affected from 74837bca0748763a77f77db47a0bdbe63b347628 to 3b91160e9a91b5a2662875417dc42dc5b0bf03ea (excl.)
  • affected from 9c328f54741bd5465ca1dc717c84c04242fac2e1 to c692db813a7e3b7c3c17d6e9a3ad2a018bf1142b (excl.)
  • affected from 9c328f54741bd5465ca1dc717c84c04242fac2e1 to 498fc5d0d650c77e87fcc73808d4f43240c21805 (excl.)
  • affected from 9c328f54741bd5465ca1dc717c84c04242fac2e1 to 571dcbeb8e635182bb825ae758399831805693c2 (excl.)
  • Version c395d1e548cc68e84584ffa2e3ca9796a78bf7b9 is affected
Vendor Linux
Product Linux
Versions Default: affected
  • Version 6.18 is affected
  • unaffected from 0 to 6.18 (excl.)
  • unaffected from 5.15.202 to 5.15.* (incl.)
  • unaffected from 6.1.165 to 6.1.* (incl.)
  • unaffected from 6.6.128 to 6.6.* (incl.)
  • unaffected from 6.12.75 to 6.12.* (incl.)
  • unaffected from 6.18.16 to 6.18.* (incl.)
  • unaffected from 6.19.6 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References