CVE-2026-31622
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
24/04/2026
Last modified:
28/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
NFC: digital: Bounds check NFC-A cascade depth in SDD response handler<br />
<br />
The NFC-A anti-collision cascade in digital_in_recv_sdd_res() appends 3<br />
or 4 bytes to target->nfcid1 on each round, but the number of cascade<br />
rounds is controlled entirely by the peer device. The peer sets the<br />
cascade tag in the SDD_RES (deciding 3 vs 4 bytes) and the<br />
cascade-incomplete bit in the SEL_RES (deciding whether another round<br />
follows).<br />
<br />
ISO 14443-3 limits NFC-A to three cascade levels and target->nfcid1 is<br />
sized accordingly (NFC_NFCID1_MAXSIZE = 10), but nothing in the driver<br />
actually enforces this. This means a malicious peer can keep the<br />
cascade running, writing past the heap-allocated nfc_target with each<br />
round.<br />
<br />
Fix this by rejecting the response when the accumulated UID would exceed<br />
the buffer.<br />
<br />
Commit e329e71013c9 ("NFC: nci: Bounds check struct nfc_target arrays")<br />
fixed similar missing checks against the same field on the NCI path.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.13 (including) | 6.6.136 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.83 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.24 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 7.0 (including) | 7.0.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1bec5698b55aa2be5c3b983dba657c01d0fd3dbc
- https://git.kernel.org/stable/c/2819f34e08bdffb6f06a51c67948ec5737fb166a
- https://git.kernel.org/stable/c/46ce8be2ced389bccd84bcc04a12cf2f4d0c22d1
- https://git.kernel.org/stable/c/5a59bf70c38ee1eb4be03bab830bbc3a6f0bd1f1
- https://git.kernel.org/stable/c/8d9d9bf3565271ca7ab9c716a94e87296177e7ba
- https://git.kernel.org/stable/c/cc024a3de265ef6c58957f4990eccb9f806208cb



