{"api_version":"1","generated_at":"2026-05-11T11:03:43+00:00","cve":"CVE-2026-43291","urls":{"html":"https://cve.report/CVE-2026-43291","api":"https://cve.report/api/cve/CVE-2026-43291.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-43291","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-43291"},"summary":{"title":"net: nfc: nci: Fix parameter validation for packet data","description":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: nfc: nci: Fix parameter validation for packet data\n\nSince commit 9c328f54741b (\"net: nfc: nci: Add parameter validation for\npacket data\") communication with nci nfc chips is not working any more.\n\nThe mentioned commit tries to fix access of uninitialized data, but\nfailed to understand that in some cases the data packet is of variable\nlength and can therefore not be compared to the maximum packet length\ngiven by the sizeof(struct).","state":"PUBLISHED","assigner":"Linux","published_at":"2026-05-08 14:16:36","updated_at":"2026-05-11 08:16:08"},"problem_types":[],"metrics":[{"version":"3.1","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","type":"Secondary","score":"8.3","severity":"HIGH","vector":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H","baseScore":8.3,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"8.3","severity":"HIGH","vector":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H","data":{"baseScore":8.3,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H","version":"3.1"}}],"references":[{"url":"https://git.kernel.org/stable/c/ad058a4317db7fdb3f09caa6ed536d24a62ce6a0","name":"https://git.kernel.org/stable/c/ad058a4317db7fdb3f09caa6ed536d24a62ce6a0","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/3b91160e9a91b5a2662875417dc42dc5b0bf03ea","name":"https://git.kernel.org/stable/c/3b91160e9a91b5a2662875417dc42dc5b0bf03ea","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/f5218426f765eee22e178df9c126d974792fb6a5","name":"https://git.kernel.org/stable/c/f5218426f765eee22e178df9c126d974792fb6a5","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/a24a8a582da4426b2042e510a1080df84083b51d","name":"https://git.kernel.org/stable/c/a24a8a582da4426b2042e510a1080df84083b51d","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/c692db813a7e3b7c3c17d6e9a3ad2a018bf1142b","name":"https://git.kernel.org/stable/c/c692db813a7e3b7c3c17d6e9a3ad2a018bf1142b","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/571dcbeb8e635182bb825ae758399831805693c2","name":"https://git.kernel.org/stable/c/571dcbeb8e635182bb825ae758399831805693c2","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/498fc5d0d650c77e87fcc73808d4f43240c21805","name":"https://git.kernel.org/stable/c/498fc5d0d650c77e87fcc73808d4f43240c21805","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-43291","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-43291","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 8fcc7315a10a84264e55bb65ede10f0af20a983f a24a8a582da4426b2042e510a1080df84083b51d git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected bfdda0123dde406dbff62e7e9136037e97998a15 f5218426f765eee22e178df9c126d974792fb6a5 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 0ba68bea1e356f466ad29449938bea12f5f3711f ad058a4317db7fdb3f09caa6ed536d24a62ce6a0 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 74837bca0748763a77f77db47a0bdbe63b347628 3b91160e9a91b5a2662875417dc42dc5b0bf03ea git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 9c328f54741bd5465ca1dc717c84c04242fac2e1 c692db813a7e3b7c3c17d6e9a3ad2a018bf1142b git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 9c328f54741bd5465ca1dc717c84c04242fac2e1 498fc5d0d650c77e87fcc73808d4f43240c21805 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 9c328f54741bd5465ca1dc717c84c04242fac2e1 571dcbeb8e635182bb825ae758399831805693c2 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected c395d1e548cc68e84584ffa2e3ca9796a78bf7b9 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6.18","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.18 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.15.202 5.15.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.1.165 6.1.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.6.128 6.6.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.12.75 6.12.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.18.16 6.18.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19.6 6.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.0 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"43291","cve":"CVE-2026-43291","epss":"0.000240000","percentile":"0.070400000","score_date":"2026-05-10","updated_at":"2026-05-11 00:14:41"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["net/nfc/nci/ntf.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"a24a8a582da4426b2042e510a1080df84083b51d","status":"affected","version":"8fcc7315a10a84264e55bb65ede10f0af20a983f","versionType":"git"},{"lessThan":"f5218426f765eee22e178df9c126d974792fb6a5","status":"affected","version":"bfdda0123dde406dbff62e7e9136037e97998a15","versionType":"git"},{"lessThan":"ad058a4317db7fdb3f09caa6ed536d24a62ce6a0","status":"affected","version":"0ba68bea1e356f466ad29449938bea12f5f3711f","versionType":"git"},{"lessThan":"3b91160e9a91b5a2662875417dc42dc5b0bf03ea","status":"affected","version":"74837bca0748763a77f77db47a0bdbe63b347628","versionType":"git"},{"lessThan":"c692db813a7e3b7c3c17d6e9a3ad2a018bf1142b","status":"affected","version":"9c328f54741bd5465ca1dc717c84c04242fac2e1","versionType":"git"},{"lessThan":"498fc5d0d650c77e87fcc73808d4f43240c21805","status":"affected","version":"9c328f54741bd5465ca1dc717c84c04242fac2e1","versionType":"git"},{"lessThan":"571dcbeb8e635182bb825ae758399831805693c2","status":"affected","version":"9c328f54741bd5465ca1dc717c84c04242fac2e1","versionType":"git"},{"status":"affected","version":"c395d1e548cc68e84584ffa2e3ca9796a78bf7b9","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["net/nfc/nci/ntf.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"6.18"},{"lessThan":"6.18","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"5.15.*","status":"unaffected","version":"5.15.202","versionType":"semver"},{"lessThanOrEqual":"6.1.*","status":"unaffected","version":"6.1.165","versionType":"semver"},{"lessThanOrEqual":"6.6.*","status":"unaffected","version":"6.6.128","versionType":"semver"},{"lessThanOrEqual":"6.12.*","status":"unaffected","version":"6.12.75","versionType":"semver"},{"lessThanOrEqual":"6.18.*","status":"unaffected","version":"6.18.16","versionType":"semver"},{"lessThanOrEqual":"6.19.*","status":"unaffected","version":"6.19.6","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"7.0","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.15.202","versionStartIncluding":"5.15.195","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.1.165","versionStartIncluding":"6.1.156","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.128","versionStartIncluding":"6.6.112","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.12.75","versionStartIncluding":"6.12.53","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.18.16","versionStartIncluding":"6.18","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.6","versionStartIncluding":"6.18","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0","versionStartIncluding":"6.18","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.17.3","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: nfc: nci: Fix parameter validation for packet data\n\nSince commit 9c328f54741b (\"net: nfc: nci: Add parameter validation for\npacket data\") communication with nci nfc chips is not working any more.\n\nThe mentioned commit tries to fix access of uninitialized data, but\nfailed to understand that in some cases the data packet is of variable\nlength and can therefore not be compared to the maximum packet length\ngiven by the sizeof(struct)."}],"metrics":[{"cvssV3_1":{"baseScore":8.3,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H","version":"3.1"}}],"providerMetadata":{"dateUpdated":"2026-05-11T06:32:57.607Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/a24a8a582da4426b2042e510a1080df84083b51d"},{"url":"https://git.kernel.org/stable/c/f5218426f765eee22e178df9c126d974792fb6a5"},{"url":"https://git.kernel.org/stable/c/ad058a4317db7fdb3f09caa6ed536d24a62ce6a0"},{"url":"https://git.kernel.org/stable/c/3b91160e9a91b5a2662875417dc42dc5b0bf03ea"},{"url":"https://git.kernel.org/stable/c/c692db813a7e3b7c3c17d6e9a3ad2a018bf1142b"},{"url":"https://git.kernel.org/stable/c/498fc5d0d650c77e87fcc73808d4f43240c21805"},{"url":"https://git.kernel.org/stable/c/571dcbeb8e635182bb825ae758399831805693c2"}],"title":"net: nfc: nci: Fix parameter validation for packet data","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-43291","datePublished":"2026-05-08T13:11:15.312Z","dateReserved":"2026-05-01T14:12:55.999Z","dateUpdated":"2026-05-11T06:32:57.607Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-08 14:16:36","lastModifiedDate":"2026-05-11 08:16:08","problem_types":[],"metrics":{"cvssMetricV31":[{"source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H","baseScore":8.3,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.5}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"43291","Ordinal":"1","Title":"net: nfc: nci: Fix parameter validation for packet data","CVE":"CVE-2026-43291","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"43291","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: nfc: nci: Fix parameter validation for packet data\n\nSince commit 9c328f54741b (\"net: nfc: nci: Add parameter validation for\npacket data\") communication with nci nfc chips is not working any more.\n\nThe mentioned commit tries to fix access of uninitialized data, but\nfailed to understand that in some cases the data packet is of variable\nlength and can therefore not be compared to the maximum packet length\ngiven by the sizeof(struct).","Type":"Description","Title":"net: nfc: nci: Fix parameter validation for packet data"}]}}}