CVE-2026-31622
Gravedad CVSS v3.1:
ALTA
Tipo:
CWE-120
Copia de búfer sin comprobación del tamaño de entrada (Desbordamiento de búfer clásico)
Fecha de publicación:
24/04/2026
Última modificación:
28/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
NFC: digital: Bounds check NFC-A cascade depth in SDD response handler<br />
<br />
The NFC-A anti-collision cascade in digital_in_recv_sdd_res() appends 3<br />
or 4 bytes to target->nfcid1 on each round, but the number of cascade<br />
rounds is controlled entirely by the peer device. The peer sets the<br />
cascade tag in the SDD_RES (deciding 3 vs 4 bytes) and the<br />
cascade-incomplete bit in the SEL_RES (deciding whether another round<br />
follows).<br />
<br />
ISO 14443-3 limits NFC-A to three cascade levels and target->nfcid1 is<br />
sized accordingly (NFC_NFCID1_MAXSIZE = 10), but nothing in the driver<br />
actually enforces this. This means a malicious peer can keep the<br />
cascade running, writing past the heap-allocated nfc_target with each<br />
round.<br />
<br />
Fix this by rejecting the response when the accumulated UID would exceed<br />
the buffer.<br />
<br />
Commit e329e71013c9 ("NFC: nci: Bounds check struct nfc_target arrays")<br />
fixed similar missing checks against the same field on the NCI path.
Impacto
Puntuación base 3.x
8.80
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.13 (incluyendo) | 6.6.136 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (incluyendo) | 6.12.83 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (incluyendo) | 6.18.24 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (incluyendo) | 6.19.14 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 7.0 (incluyendo) | 7.0.1 (excluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/1bec5698b55aa2be5c3b983dba657c01d0fd3dbc
- https://git.kernel.org/stable/c/2819f34e08bdffb6f06a51c67948ec5737fb166a
- https://git.kernel.org/stable/c/46ce8be2ced389bccd84bcc04a12cf2f4d0c22d1
- https://git.kernel.org/stable/c/5a59bf70c38ee1eb4be03bab830bbc3a6f0bd1f1
- https://git.kernel.org/stable/c/8d9d9bf3565271ca7ab9c716a94e87296177e7ba
- https://git.kernel.org/stable/c/cc024a3de265ef6c58957f4990eccb9f806208cb



