CVE-2022-48967: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: NFC: nci: Bounds check struct nfc_target arrays While running under CONFIG_FORTIFY_SOURCE=y, syzkaller reported: memcpy: detected field-spanning write (size 129) of single field "target->sensf_res" at net/nfc/nci/ntf.c:260 (size 18) This appears to be a legitimate lack of bounds checking in nci_add_new_protocol(). Add the missing checks.
AI Analysis
Technical Summary
CVE-2022-48967 is a vulnerability identified in the Linux kernel's NFC (Near Field Communication) subsystem, specifically within the nci (NFC Controller Interface) component. The issue arises due to a lack of proper bounds checking in the function nci_add_new_protocol(), which handles the addition of new NFC protocols. The vulnerability was discovered through syzkaller, a kernel fuzzing tool, which detected a field-spanning write of size 129 bytes to a single field "target->sensf_res" that is only 18 bytes in size. This indicates a buffer overflow condition where data is copied beyond the allocated memory bounds, potentially corrupting adjacent memory. The vulnerability manifests under the kernel configuration option CONFIG_FORTIFY_SOURCE=y, which is designed to detect memory corruption errors. The root cause is the absence of adequate bounds checking on the struct nfc_target arrays, allowing memcpy operations to write more data than the target buffer can hold. This flaw could lead to memory corruption, which attackers might exploit to cause denial of service (kernel panic), or potentially execute arbitrary code with kernel privileges if combined with other vulnerabilities or conditions. The vulnerability affects multiple versions of the Linux kernel identified by the commit hash 019c4fbaa790e2b3f11dab0c8b7d9896d77db3e5. As of the published date (October 21, 2024), no known exploits are reported in the wild, and no official patches or CVSS scores have been released yet. However, the Linux kernel maintainers have acknowledged the issue and added the missing bounds checks to mitigate the risk.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to systems running Linux kernels with NFC capabilities enabled, such as embedded devices, IoT equipment, and certain mobile or industrial systems. Exploitation could allow attackers to corrupt kernel memory, leading to system crashes or privilege escalation. Given the widespread use of Linux in critical infrastructure, telecommunications, and industrial control systems across Europe, successful exploitation could disrupt operations, compromise data integrity, and potentially enable further attacks within networks. The impact is heightened in sectors relying on NFC technology for secure communications or access control, such as transportation, manufacturing, and finance. Although no active exploits are known, the vulnerability's presence in the kernel code base means that attackers with local access or the ability to interact with NFC interfaces could attempt exploitation. This risk is particularly relevant for organizations with NFC-enabled devices accessible to untrusted users or networks. The lack of a CVSS score and public exploits suggests the threat is currently moderate but could escalate if weaponized. Therefore, European entities must proactively address this vulnerability to prevent potential service disruptions and security breaches.
Mitigation Recommendations
Organizations should immediately verify if their Linux systems are running affected kernel versions with NFC support enabled. Specific mitigation steps include: 1) Applying the latest Linux kernel updates or patches that include the bounds checking fix for nci_add_new_protocol(). Monitor official Linux kernel repositories and vendor advisories for patch releases. 2) If patching is not immediately possible, consider disabling NFC functionality on vulnerable systems to eliminate the attack surface. 3) Implement strict access controls to limit local user access and restrict NFC device interactions to trusted users and applications only. 4) Employ kernel hardening techniques such as enabling SELinux/AppArmor policies and using kernel lockdown features to reduce the impact of potential exploits. 5) Monitor system logs and NFC subsystem activity for unusual behavior that could indicate exploitation attempts. 6) Conduct security audits on embedded and IoT devices using Linux kernels with NFC to ensure they are not exposed to untrusted environments. These targeted actions go beyond generic advice by focusing on the NFC subsystem and kernel-level protections specific to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland, Poland, Belgium
CVE-2022-48967: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: NFC: nci: Bounds check struct nfc_target arrays While running under CONFIG_FORTIFY_SOURCE=y, syzkaller reported: memcpy: detected field-spanning write (size 129) of single field "target->sensf_res" at net/nfc/nci/ntf.c:260 (size 18) This appears to be a legitimate lack of bounds checking in nci_add_new_protocol(). Add the missing checks.
AI-Powered Analysis
Technical Analysis
CVE-2022-48967 is a vulnerability identified in the Linux kernel's NFC (Near Field Communication) subsystem, specifically within the nci (NFC Controller Interface) component. The issue arises due to a lack of proper bounds checking in the function nci_add_new_protocol(), which handles the addition of new NFC protocols. The vulnerability was discovered through syzkaller, a kernel fuzzing tool, which detected a field-spanning write of size 129 bytes to a single field "target->sensf_res" that is only 18 bytes in size. This indicates a buffer overflow condition where data is copied beyond the allocated memory bounds, potentially corrupting adjacent memory. The vulnerability manifests under the kernel configuration option CONFIG_FORTIFY_SOURCE=y, which is designed to detect memory corruption errors. The root cause is the absence of adequate bounds checking on the struct nfc_target arrays, allowing memcpy operations to write more data than the target buffer can hold. This flaw could lead to memory corruption, which attackers might exploit to cause denial of service (kernel panic), or potentially execute arbitrary code with kernel privileges if combined with other vulnerabilities or conditions. The vulnerability affects multiple versions of the Linux kernel identified by the commit hash 019c4fbaa790e2b3f11dab0c8b7d9896d77db3e5. As of the published date (October 21, 2024), no known exploits are reported in the wild, and no official patches or CVSS scores have been released yet. However, the Linux kernel maintainers have acknowledged the issue and added the missing bounds checks to mitigate the risk.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to systems running Linux kernels with NFC capabilities enabled, such as embedded devices, IoT equipment, and certain mobile or industrial systems. Exploitation could allow attackers to corrupt kernel memory, leading to system crashes or privilege escalation. Given the widespread use of Linux in critical infrastructure, telecommunications, and industrial control systems across Europe, successful exploitation could disrupt operations, compromise data integrity, and potentially enable further attacks within networks. The impact is heightened in sectors relying on NFC technology for secure communications or access control, such as transportation, manufacturing, and finance. Although no active exploits are known, the vulnerability's presence in the kernel code base means that attackers with local access or the ability to interact with NFC interfaces could attempt exploitation. This risk is particularly relevant for organizations with NFC-enabled devices accessible to untrusted users or networks. The lack of a CVSS score and public exploits suggests the threat is currently moderate but could escalate if weaponized. Therefore, European entities must proactively address this vulnerability to prevent potential service disruptions and security breaches.
Mitigation Recommendations
Organizations should immediately verify if their Linux systems are running affected kernel versions with NFC support enabled. Specific mitigation steps include: 1) Applying the latest Linux kernel updates or patches that include the bounds checking fix for nci_add_new_protocol(). Monitor official Linux kernel repositories and vendor advisories for patch releases. 2) If patching is not immediately possible, consider disabling NFC functionality on vulnerable systems to eliminate the attack surface. 3) Implement strict access controls to limit local user access and restrict NFC device interactions to trusted users and applications only. 4) Employ kernel hardening techniques such as enabling SELinux/AppArmor policies and using kernel lockdown features to reduce the impact of potential exploits. 5) Monitor system logs and NFC subsystem activity for unusual behavior that could indicate exploitation attempts. 6) Conduct security audits on embedded and IoT devices using Linux kernels with NFC to ensure they are not exposed to untrusted environments. These targeted actions go beyond generic advice by focusing on the NFC subsystem and kernel-level protections specific to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-08-22T01:27:53.628Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982fc4522896dcbe6795
Added to database: 5/21/2025, 9:09:03 AM
Last enriched: 7/1/2025, 12:39:57 AM
Last updated: 8/13/2025, 12:46:26 PM
Views: 12
Related Threats
CVE-2025-9006: Buffer Overflow in Tenda CH22
HighCVE-2025-9005: Information Exposure Through Error Message in mtons mblog
MediumCVE-2025-9004: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumCVE-2025-9003: Cross Site Scripting in D-Link DIR-818LW
MediumCVE-2025-55726
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.