CVE-2022-48967

Source
https://cve.org/CVERecord?id=CVE-2022-48967
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48967.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48967
Downstream
Related
Published
2024-10-21T20:05:49.740Z
Modified
2026-03-12T03:24:20.761113Z
Summary
NFC: nci: Bounds check struct nfc_target arrays
Details

In the Linux kernel, the following vulnerability has been resolved:

NFC: nci: Bounds check struct nfc_target arrays

While running under CONFIGFORTIFYSOURCE=y, syzkaller reported:

memcpy: detected field-spanning write (size 129) of single field "target->sensf_res" at net/nfc/nci/ntf.c:260 (size 18)

This appears to be a legitimate lack of bounds checking in nciaddnew_protocol(). Add the missing checks.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48967.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
019c4fbaa790e2b3f11dab0c8b7d9896d77db3e5
Fixed
6b37f0dc0638d13a006f2f24d2f6ca61e83bc714
Fixed
dbdcfb9f6748218a149f62468d6297ce3f014e9c
Fixed
cff35329070b96b4484d23f9f48a5ca2c947e750
Fixed
6778434706940b8fad7ef35f410d2b9929f256d2
Fixed
27eb2d7a1b9987b6d0429b7716b1ff3b82c4ffc9
Fixed
908b2da426fe9c3ce74cf541ba40e7a4251db191
Fixed
f41547546db9af99da2c34e3368664d7a79cefae
Fixed
e329e71013c9b5a4535b099208493c7826ee4a64

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48967.json"