NFC: pn533: bound the UART receive buffer
Summary
| CVE | CVE-2026-43032 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-01 15:16:47 UTC |
| Updated | 2026-05-08 18:39:32 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: NFC: pn533: bound the UART receive buffer pn532_receive_buf() appends every incoming byte to dev->recv_skb and only resets the buffer after pn532_uart_rx_is_frame() recognizes a complete frame. A continuous stream of bytes without a valid PN532 frame header therefore keeps growing the skb until skb_put_u8() hits the tail limit. Drop the accumulated partial frame once the fixed receive buffer is full so malformed UART traffic cannot grow the skb past PN532_UART_SKB_BUFF_LEN. |
Risk And Classification
Primary CVSS: v3.1 5.5 MEDIUM from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
EPSS: 0.000240000 probability, percentile 0.068060000 (date 2026-05-05)
Problem Types: NVD-CWE-noinfo
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
NoneAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected c656aa4c27b17a8c70da223ed5ab42145800d6b5 8bedf1dd5640ac8997bff00bbefe241b438df397 git | Not specified |
| CNA | Linux | Linux | affected c656aa4c27b17a8c70da223ed5ab42145800d6b5 23e925183db26cd322597679669ad29d70ed2ada git | Not specified |
| CNA | Linux | Linux | affected c656aa4c27b17a8c70da223ed5ab42145800d6b5 3adca9be14bf36b927193f05f5aea35a1a90e913 git | Not specified |
| CNA | Linux | Linux | affected c656aa4c27b17a8c70da223ed5ab42145800d6b5 2c1fadd221b21d8038acfe6a0f56291881d5ff76 git | Not specified |
| CNA | Linux | Linux | affected c656aa4c27b17a8c70da223ed5ab42145800d6b5 f48ab6ee654ecc350434e4566bc785773f412b7e git | Not specified |
| CNA | Linux | Linux | affected c656aa4c27b17a8c70da223ed5ab42145800d6b5 ad2f60de5045bfb5d20ea468a97c8760c6a3a4f8 git | Not specified |
| CNA | Linux | Linux | affected c656aa4c27b17a8c70da223ed5ab42145800d6b5 cf2ff10183204349edfd6b972e189375fc5f1fb0 git | Not specified |
| CNA | Linux | Linux | affected c656aa4c27b17a8c70da223ed5ab42145800d6b5 30fe3f5f6494f827d812ff179f295a8e532709d6 git | Not specified |
| CNA | Linux | Linux | affected 5.5 | Not specified |
| CNA | Linux | Linux | unaffected 5.5 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.253 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.203 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.168 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.134 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.81 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.22 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.12 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/23e925183db26cd322597679669ad29d70ed2ada | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/cf2ff10183204349edfd6b972e189375fc5f1fb0 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/30fe3f5f6494f827d812ff179f295a8e532709d6 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/f48ab6ee654ecc350434e4566bc785773f412b7e | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/8bedf1dd5640ac8997bff00bbefe241b438df397 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/2c1fadd221b21d8038acfe6a0f56291881d5ff76 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/3adca9be14bf36b927193f05f5aea35a1a90e913 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/ad2f60de5045bfb5d20ea468a97c8760c6a3a4f8 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.