PatchSiren cyber security CVE debrief
CVE-2026-43291 Git CVE debrief
CVE-2026-43291 affects the Linux kernel NFC NCI stack. A prior change intended to prevent access to uninitialized packet data instead treated some variable-length packet payloads as if they had a fixed maximum size, which can break communication with NCI NFC chips. The CVE record and NVD metadata classify this as high severity and list multiple kernel.org stable references for the fix.
- Vendor
- Git
- Product
- Unknown
- CVSS
- HIGH 8.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-08
- Original CVE updated
- 2026-05-11
- Advisory published
- 2026-05-08
- Advisory updated
- 2026-05-11
Who should care
Linux kernel maintainers, distribution security teams, embedded and mobile OEMs, and fleet operators that deploy systems with NFC hardware using the kernel NCI stack.
Technical summary
According to the supplied description, commit 9c328f54741b introduced overly strict parameter validation for packet data in net/nfc/nci. The check failed to account for variable-length packet formats and compared data against the sizeof(struct) maximum, which caused valid communication with NCI NFC chips to stop working. The NVD record lists CVSS 3.1 as AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H and includes several kernel.org stable commit references for remediation.
Defensive priority
High for any environment that uses the Linux kernel NFC NCI subsystem; lower priority for systems that do not use NFC hardware.
Recommended defensive actions
- Apply the kernel update or stable backport that contains the NFC NCI validation fix.
- Inventory devices and fleets that rely on NFC hardware to determine exposure to the kernel NCI path.
- Verify NFC chip communication after patching to confirm normal operation is restored.
- Track vendor kernel advisories and backport status for your Linux distribution or device firmware.
- Prioritize testing in embedded, mobile, and appliance environments where NFC functionality is user-facing or operationally required.
Evidence notes
This debrief is based only on the supplied CVE description, NVD metadata, and the official references listed in the record. The description states that the regression came from commit 9c328f54741b and that the problem was comparing variable-length packet data to a struct size. NVD lists the CVSS vector AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H and provides multiple kernel.org stable references. No affected version range or exploit details were supplied in the corpus.
Official resources
-
CVE-2026-43291 CVE record
CVE.org
-
CVE-2026-43291 NVD detail
NVD
-
Source item URL
nvd_modified
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Publicly disclosed on 2026-05-08 and last modified on 2026-05-11, per the supplied CVE timeline and NVD record.