{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T00:13:09.885","vulnerabilities":[{"cve":{"id":"CVE-2024-36015","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2024-05-29T08:15:33.880","lastModified":"2025-11-04T18:16:23.557","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nppdev: Add an error check in register_device\n\nIn register_device, the return value of ida_simple_get is unchecked,\nin witch ida_simple_get will use an invalid index value.\n\nTo address this issue, index should be checked after ida_simple_get. When\nthe index value is abnormal, a warning message should be printed, the port\nshould be dropped, and the value should be recorded."},{"lang":"es","value":"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ppdev: agregue una verificación de errores en Register_device. En Register_device, el valor de retorno de ida_simple_get no está marcado, por lo que ida_simple_get usará un valor de índice no válido. Para solucionar este problema, se debe verificar el índice después de ida_simple_get. Cuando el valor del índice es anormal, se debe imprimir un mensaje de advertencia, se debe descartar el puerto y se debe registrar el valor."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-129"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9.22","versionEndExcluding":"4.10","matchCriteriaId":"C3B7FF9A-7C53-4993-8BB9-9024BFBCEC48"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10.7","versionEndExcluding":"4.11","matchCriteriaId":"002AFF57-621F-4DFC-BA33-323006B9E2CB"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11.1","versionEndExcluding":"4.19.316","matchCriteriaId":"E8C7D906-0A7A-42B1-B654-E2613834E498"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"5.4.278","matchCriteriaId":"7FDBF235-DA18-49A1-8690-6C7272FD0701"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.10.219","matchCriteriaId":"E9063AF3-D593-43B7-810D-58B87F82F9F9"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11","versionEndExcluding":"5.15.161","matchCriteriaId":"31130639-53FE-4726-8986-434EE2528CB2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"6.1.93","matchCriteriaId":"EEFB78EE-F990-4197-BF1C-156760A55667"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2","versionEndExcluding":"6.6.33","matchCriteriaId":"FCE796DF-3B50-4DC6-BAE5-95271068FC9E"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7","versionEndExcluding":"6.9.4","matchCriteriaId":"991B9791-966A-4D18-9E8D-A8AB128E5627"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:4.11:-:*:*:*:*:*:*","matchCriteriaId":"623D643F-123E-4D3E-8CBF-16BF845D734B"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:4.11:rc4:*:*:*:*:*:*","matchCriteriaId":"A659506C-868E-4E87-B0D8-E901BC2E9BDC"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:*","matchCriteriaId":"ACE2C8C3-F2AA-4A39-9D81-B0F8BB82B834"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:*","matchCriteriaId":"D67BFFD0-1A52-4F5D-98DB-D94B58FD8D30"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:*","matchCriteriaId":"7D996F38-22AC-4059-84FC-F7D69CE0CB9B"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:4.11:rc8:*:*:*:*:*:*","matchCriteriaId":"97EFF4F7-E5F9-4FAA-AD58-94A24501AD59"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/5d5b24edad1107a2ffa99058f20f6aeeafeb5d39","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/65cd017d43f4319a56747d38308b0a24cf57299e","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/b65d0410b879af0295d22438a4a32012786d152a","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/b8c6b83cc3adff3ddf403c8c7063fe6d08b2b9d9","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/d32caf51379a4d71db03d3d4d7c22d27cdf7f68b","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/df9329247dbbf00f6057e002139ab3fa529ad828","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/ec3468221efec6660ff656e9ebe51ced3520fc57","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/fbf740aeb86a4fe82ad158d26d711f2f3be79b3e","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/5d5b24edad1107a2ffa99058f20f6aeeafeb5d39","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/65cd017d43f4319a56747d38308b0a24cf57299e","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/b65d0410b879af0295d22438a4a32012786d152a","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/b8c6b83cc3adff3ddf403c8c7063fe6d08b2b9d9","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/d32caf51379a4d71db03d3d4d7c22d27cdf7f68b","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/df9329247dbbf00f6057e002139ab3fa529ad828","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/ec3468221efec6660ff656e9ebe51ced3520fc57","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/fbf740aeb86a4fe82ad158d26d711f2f3be79b3e","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}