st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Fedoraproject
Subscribe
|
Fedora
Subscribe
|
|
Linux
Subscribe
|
Linux Kernel
Subscribe
|
|
Netapp
Subscribe
|
H300e
Subscribe
H300e Firmware
Subscribe
H300s
Subscribe
H300s Firmware
Subscribe
H410c
Subscribe
H410c Firmware
Subscribe
H410s
Subscribe
H410s Firmware
Subscribe
H500e
Subscribe
H500e Firmware
Subscribe
H500s
Subscribe
H500s Firmware
Subscribe
H700e
Subscribe
H700e Firmware
Subscribe
H700s
Subscribe
H700s Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3065-1 | linux security update |
Debian DSA |
DSA-5127-1 | linux security update |
Debian DSA |
DSA-5173-1 | linux security update |
EUVD |
EUVD-2022-31048 | st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters. |
Ubuntu USN |
USN-5381-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5390-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5390-2 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-5413-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5415-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5417-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5418-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T05:03:32.925Z
Reserved: 2022-03-06T00:00:00
Link: CVE-2022-26490
No data.
Status : Analyzed
Published: 2022-03-06T04:15:07.100
Modified: 2025-06-25T21:01:34.963
Link: CVE-2022-26490
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN