st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.
References
Link | Resource |
---|---|
https://github.com/torvalds/linux/commit/4fbcc1a4cb20fe26ad0225679c536c80f1648221 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/ | |
https://security.netapp.com/advisory/ntap-20220429-0004/ | Third Party Advisory |
https://www.debian.org/security/2022/dsa-5127 | Third Party Advisory |
https://www.debian.org/security/2022/dsa-5173 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-03-06T03:58:33
Updated: 2022-07-04T10:10:14
Reserved: 2022-03-06T00:00:00
Link: CVE-2022-26490
JSON object: View
NVD Information
Status : Modified
Published: 2022-03-06T04:15:07.100
Modified: 2023-11-07T03:45:01.100
Link: CVE-2022-26490
JSON object: View
Redhat Information
No data.
CWE