CVE-2022-26490
📋 TL;DR
This CVE describes a buffer overflow vulnerability in the Linux kernel's NFC driver (st21nfca). Attackers can exploit this by sending specially crafted NFC connectivity events with untrusted length parameters, potentially leading to kernel memory corruption. Systems running Linux kernel versions up to 5.16.12 with NFC functionality enabled are affected.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Fedora by Fedoraproject
Fedora by Fedoraproject
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Successful exploitation could lead to kernel memory corruption, local privilege escalation to root, or denial of service through kernel panic/crash.
Likely Case
Local privilege escalation allowing an unprivileged user to gain root access on the affected system.
If Mitigated
If proper access controls are in place and NFC functionality is disabled, the attack surface is significantly reduced.
🎯 Exploit Status
Exploitation requires local access or physical proximity to NFC hardware. No public exploit code has been identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Linux kernel 5.16.13 and later
Vendor Advisory: https://github.com/torvalds/linux/commit/4fbcc1a4cb20fe26ad0225679c536c80f1648221
Restart Required: Yes
Instructions:
1. Update Linux kernel to version 5.16.13 or later. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Reboot system to load patched kernel.
🔧 Temporary Workarounds
Disable NFC functionality
linuxUnload the vulnerable st21nfca NFC driver to prevent exploitation
sudo rmmod st21nfca
Blacklist NFC driver
linuxPrevent the vulnerable driver from loading at boot
echo 'blacklist st21nfca' | sudo tee /etc/modprobe.d/blacklist-st21nfca.conf
🧯 If You Can't Patch
- Disable NFC hardware in BIOS/UEFI if not required
- Implement strict access controls to limit local user privileges
🔍 How to Verify
Check if Vulnerable:
Check if st21nfca driver is loaded: lsmod | grep st21nfca
Check Version:
uname -r
Verify Fix Applied:
Check kernel version: uname -r should be 5.16.13 or higher
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- OOM killer messages related to NFC
- System crashes after NFC events
Network Indicators:
- Unusual NFC communication patterns
SIEM Query:
source="kernel" AND ("st21nfca" OR "NFC" OR "buffer overflow")
🔗 References
- https://github.com/torvalds/linux/commit/4fbcc1a4cb20fe26ad0225679c536c80f1648221
- https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/
- https://security.netapp.com/advisory/ntap-20220429-0004/
- https://www.debian.org/security/2022/dsa-5127
- https://www.debian.org/security/2022/dsa-5173
- https://github.com/torvalds/linux/commit/4fbcc1a4cb20fe26ad0225679c536c80f1648221
- https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/
- https://security.netapp.com/advisory/ntap-20220429-0004/
- https://www.debian.org/security/2022/dsa-5127
- https://www.debian.org/security/2022/dsa-5173