{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2024-35915","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-05-17T13:50:33.122Z","datePublished":"2024-05-19T08:35:08.239Z","dateUpdated":"2026-05-12T11:52:46.691Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T20:13:42.171Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet\n\nsyzbot reported the following uninit-value access issue [1][2]:\n\nnci_rx_work() parses and processes received packet. When the payload\nlength is zero, each message type handler reads uninitialized payload\nand KMSAN detects this issue. The receipt of a packet with a zero-size\npayload is considered unexpected, and therefore, such packets should be\nsilently discarded.\n\nThis patch resolved this issue by checking payload size before calling\neach message type handler codes."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/nfc/nci/core.c"],"versions":[{"version":"6a2968aaf50c7a22fced77a5e24aa636281efca8","lessThan":"11387b2effbb55f58dc2111ef4b4b896f2756240","status":"affected","versionType":"git"},{"version":"6a2968aaf50c7a22fced77a5e24aa636281efca8","lessThan":"03fe259649a551d336a7f20919b641ea100e3fff","status":"affected","versionType":"git"},{"version":"6a2968aaf50c7a22fced77a5e24aa636281efca8","lessThan":"755e53bbc61bc1aff90eafa64c8c2464fd3dfa3c","status":"affected","versionType":"git"},{"version":"6a2968aaf50c7a22fced77a5e24aa636281efca8","lessThan":"ac68d9fa09e410fa3ed20fb721d56aa558695e16","status":"affected","versionType":"git"},{"version":"6a2968aaf50c7a22fced77a5e24aa636281efca8","lessThan":"b51ec7fc9f877ef869c01d3ea6f18f6a64e831a7","status":"affected","versionType":"git"},{"version":"6a2968aaf50c7a22fced77a5e24aa636281efca8","lessThan":"a946ebee45b09294c8b0b0e77410b763c4d2817a","status":"affected","versionType":"git"},{"version":"6a2968aaf50c7a22fced77a5e24aa636281efca8","lessThan":"8948e30de81faee87eeee01ef42a1f6008f5a83a","status":"affected","versionType":"git"},{"version":"6a2968aaf50c7a22fced77a5e24aa636281efca8","lessThan":"d24b03535e5eb82e025219c2f632b485409c898f","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/nfc/nci/core.c"],"versions":[{"version":"3.2","status":"affected"},{"version":"0","lessThan":"3.2","status":"unaffected","versionType":"semver"},{"version":"4.19.312","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.274","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.215","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.154","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.85","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.26","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.8.5","lessThanOrEqual":"6.8.*","status":"unaffected","versionType":"semver"},{"version":"6.9","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2","versionEndExcluding":"4.19.312"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2","versionEndExcluding":"5.4.274"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2","versionEndExcluding":"5.10.215"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2","versionEndExcluding":"5.15.154"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2","versionEndExcluding":"6.1.85"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2","versionEndExcluding":"6.6.26"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2","versionEndExcluding":"6.8.5"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2","versionEndExcluding":"6.9"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/11387b2effbb55f58dc2111ef4b4b896f2756240"},{"url":"https://git.kernel.org/stable/c/03fe259649a551d336a7f20919b641ea100e3fff"},{"url":"https://git.kernel.org/stable/c/755e53bbc61bc1aff90eafa64c8c2464fd3dfa3c"},{"url":"https://git.kernel.org/stable/c/ac68d9fa09e410fa3ed20fb721d56aa558695e16"},{"url":"https://git.kernel.org/stable/c/b51ec7fc9f877ef869c01d3ea6f18f6a64e831a7"},{"url":"https://git.kernel.org/stable/c/a946ebee45b09294c8b0b0e77410b763c4d2817a"},{"url":"https://git.kernel.org/stable/c/8948e30de81faee87eeee01ef42a1f6008f5a83a"},{"url":"https://git.kernel.org/stable/c/d24b03535e5eb82e025219c2f632b485409c898f"}],"title":"nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-35915","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-05-20T17:12:44.324505Z"}}}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:34:39.499Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T03:21:49.232Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/11387b2effbb55f58dc2111ef4b4b896f2756240","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/03fe259649a551d336a7f20919b641ea100e3fff","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/755e53bbc61bc1aff90eafa64c8c2464fd3dfa3c","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/ac68d9fa09e410fa3ed20fb721d56aa558695e16","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/b51ec7fc9f877ef869c01d3ea6f18f6a64e831a7","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/a946ebee45b09294c8b0b0e77410b763c4d2817a","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/8948e30de81faee87eeee01ef42a1f6008f5a83a","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/d24b03535e5eb82e025219c2f632b485409c898f","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","tags":["x_transferred"]}]},{"x_adpType":"supplier","providerMetadata":{"orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP","dateUpdated":"2026-05-12T11:52:46.691Z"},"affected":[{"vendor":"Siemens","product":"SIMATIC S7-1500 TM MFP - GNU/Linux subsystem","versions":[{"status":"affected","version":"0","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"}],"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-265688.html"}]}]},"dataVersion":"5.2"}