SB20251028121 - Input validation error in Linux kernel nfc nci
Published: October 28, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2025-40043)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nci_core_reset_ntf_packet(), nci_core_conn_credits_ntf_packet(), nci_core_generic_error_ntf_packet(), nci_core_conn_intf_error_ntf_packet(), nci_clear_target_list(), nci_rf_discover_ntf_packet(), nci_store_general_bytes_nfc_dep(), nci_rf_intf_activated_ntf_packet(), nci_rf_deactivate_ntf_packet(), nci_nfcee_discover_ntf_packet() and nci_ntf_packet() functions in net/nfc/nci/ntf.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/0ba68bea1e356f466ad29449938bea12f5f3711f
- https://git.kernel.org/stable/c/74837bca0748763a77f77db47a0bdbe63b347628
- https://git.kernel.org/stable/c/8fcc7315a10a84264e55bb65ede10f0af20a983f
- https://git.kernel.org/stable/c/9c328f54741bd5465ca1dc717c84c04242fac2e1
- https://git.kernel.org/stable/c/bfdda0123dde406dbff62e7e9136037e97998a15
- https://git.kernel.org/stable/c/c395d1e548cc68e84584ffa2e3ca9796a78bf7b9