CVE-2024-36288
June 21, 2024, 3:58 p.m.
Tags
Product(s) Impacted
Linux kernel
Description
In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix loop termination condition in gss_free_in_token_pages() The in_token->pages[] array is not NULL terminated. This results in the following KASAN splat: KASAN: maybe wild-memory-access in range [0x04a2013400000008-0x04a201340000000f]
Weaknesses
Date
Published: June 21, 2024, 12:15 p.m.
Last Modified: June 21, 2024, 3:58 p.m.
Status : Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
416baaa9-dc9f-4396-8d5f-8c081fb06d67
References
https://git.kernel.org/
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/
416baaa9-dc9f-4396-8d5f-8c081fb06d67