Home

Description

In the Linux kernel, the following vulnerability has been resolved: nfc: s3fwrn5: allocate rx skb before consuming bytes s3fwrn82_uart_read() reports the number of accepted bytes to the serdev core. The current code consumes bytes into recv_skb and may already deliver a complete frame before allocating a fresh receive buffer. If that alloc_skb() fails, the callback returns 0 even though it has already consumed bytes, and it leaves recv_skb as NULL for the next receive callback. That breaks the receive_buf() accounting contract and can also lead to a NULL dereference on the next skb_put_u8(). Allocate the receive skb lazily before consuming the next byte instead. If allocation fails, return the number of bytes already accepted.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-06 | Updated 2026-05-06 | Assigner Linux

Product status

Default status
unaffected

3f52c2cb7e3ada37513dabb69a22cf917dba754f (git) before d8c2aa3c4a1ec530a485e46a1c4f1a118bb00156
affected

3f52c2cb7e3ada37513dabb69a22cf917dba754f (git) before 7c31f7a599cf00fad3c204092a91a924126c67e4
affected

3f52c2cb7e3ada37513dabb69a22cf917dba754f (git) before 6d931680a9851481c3243689488eafed08eeff71
affected

3f52c2cb7e3ada37513dabb69a22cf917dba754f (git) before 09822d3d6f68a0cdc4626e0c507324a4927f55a9
affected

3f52c2cb7e3ada37513dabb69a22cf917dba754f (git) before 5c14a19d5b1645cce1cb1252833d70b23635b632
affected

Default status
affected

5.11
affected

Any version before 5.11
unaffected

6.6.136 (semver)
unaffected

6.12.83 (semver)
unaffected

6.18.24 (semver)
unaffected

6.19.14 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/d8c2aa3c4a1ec530a485e46a1c4f1a118bb00156

git.kernel.org/...c/7c31f7a599cf00fad3c204092a91a924126c67e4

git.kernel.org/...c/6d931680a9851481c3243689488eafed08eeff71

git.kernel.org/...c/09822d3d6f68a0cdc4626e0c507324a4927f55a9

git.kernel.org/...c/5c14a19d5b1645cce1cb1252833d70b23635b632

cve.org (CVE-2026-43098)

nvd.nist.gov (CVE-2026-43098)

Download JSON