st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3065-1 | linux security update |
![]() |
DSA-5127-1 | linux security update |
![]() |
DSA-5173-1 | linux security update |
![]() |
EUVD-2022-31048 | st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters. |
![]() |
USN-5381-1 | Linux kernel (OEM) vulnerabilities |
![]() |
USN-5390-1 | Linux kernel vulnerabilities |
![]() |
USN-5390-2 | Linux kernel (Raspberry Pi) vulnerabilities |
![]() |
USN-5413-1 | Linux kernel vulnerabilities |
![]() |
USN-5415-1 | Linux kernel vulnerabilities |
![]() |
USN-5417-1 | Linux kernel vulnerabilities |
![]() |
USN-5418-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T05:03:32.925Z
Reserved: 2022-03-06T00:00:00
Link: CVE-2022-26490

No data.

Status : Analyzed
Published: 2022-03-06T04:15:07.100
Modified: 2025-06-25T21:01:34.963
Link: CVE-2022-26490


No data.