Description
In the Linux kernel, the following vulnerability has been resolved:

NFC: pn533: bound the UART receive buffer

pn532_receive_buf() appends every incoming byte to dev->recv_skb and
only resets the buffer after pn532_uart_rx_is_frame() recognizes a
complete frame. A continuous stream of bytes without a valid PN532 frame
header therefore keeps growing the skb until skb_put_u8() hits the tail
limit.

Drop the accumulated partial frame once the fixed receive buffer is full
so malformed UART traffic cannot grow the skb past
PN532_UART_SKB_BUFF_LEN.
Published: 2026-05-01
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The pn532 UART driver in the Linux kernel was allowed to append every incoming byte to an skb without resetting the buffer until a complete frame was detected. A continuous stream of bytes that does not contain a valid PN532 frame header would thus cause the skb to grow until it exceeded the tail limit, leading to memory exhaustion or a buffer overflow in the kernel. The fix clamps the receive buffer so that malformed UART traffic cannot expand the skb beyond PN532_UART_SKB_BUFF_LEN, preventing the kernel from being corrupted or crashed by malicious data.

Affected Systems

Any Linux kernel installation that contains the pn532 NFC driver and is running a version prior to the patch is potentially affected. Because the vendor list is generic (Linux:Linux) the precise affected releases are not enumerated in the available data, but all active kernel branches that ship the pn532 driver could be impacted if they have not yet applied the update.

Risk and Exploitability

The CVSS and EPSS metrics are not available, and the vulnerability is not listed in CISA’s KEV catalog, indicating no publicly known exploit or active exploitation activity at the time of this analysis. The attack vector is inferred to be local or device‑controlled, requiring an adversary to send a crafted stream of UART data to the NFC device. If successfully leveraged, the flaw could exhaust kernel memory and cause a system crash, resulting in a denial of service. Exploit feasibility is uncertain but consideration of the attacker’s physical or device access is warranted.

Generated by OpenCVE AI on May 2, 2026 at 07:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Acquire and install the latest Linux kernel release that incorporates the binding fix for the pn532 UART driver.
  • If the target environment does not require NFC pn532 functionality, disable or unload the pn532 driver or remove the device to eliminate the attack surface.
  • Apply the patch manually on distribution versions that have not yet shipped the update, and verify the driver’s source includes the buffer‑clamp change.

Generated by OpenCVE AI on May 2, 2026 at 07:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4561-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6243-1 linux security update
History

Sat, 02 May 2026 00:15:00 +0000


Fri, 01 May 2026 23:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119
CWE-122

Fri, 01 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: NFC: pn533: bound the UART receive buffer pn532_receive_buf() appends every incoming byte to dev->recv_skb and only resets the buffer after pn532_uart_rx_is_frame() recognizes a complete frame. A continuous stream of bytes without a valid PN532 frame header therefore keeps growing the skb until skb_put_u8() hits the tail limit. Drop the accumulated partial frame once the fixed receive buffer is full so malformed UART traffic cannot grow the skb past PN532_UART_SKB_BUFF_LEN.
Title NFC: pn533: bound the UART receive buffer
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-01T14:15:31.921Z

Reserved: 2026-05-01T14:12:55.977Z

Link: CVE-2026-43032

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-01T15:16:47.787

Modified: 2026-05-01T15:24:14.893

Link: CVE-2026-43032

cve-icon Redhat

Severity :

Publid Date: 2026-05-01T00:00:00Z

Links: CVE-2026-43032 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T07:15:16Z

Weaknesses