CVE-2024-36959

In the Linux kernel, the following vulnerability has been resolved: pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() If we fail to allocate propname buffer, we need to drop the reference count we just took. Because the pinctrl_dt_free_maps() includes the droping operation, here we call it directly.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:*

History

14 Jan 2025, 15:38

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-Other
CPE cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/026e24cf31733dbd97f41cc9bc5273ace428eeec - () https://git.kernel.org/stable/c/026e24cf31733dbd97f41cc9bc5273ace428eeec - Patch
References () https://git.kernel.org/stable/c/06780473cb8a858d1d6cab2673e021b072a852d1 - () https://git.kernel.org/stable/c/06780473cb8a858d1d6cab2673e021b072a852d1 - Patch
References () https://git.kernel.org/stable/c/35ab679e8bb5a81a4f922d3efbd43e32bce69274 - () https://git.kernel.org/stable/c/35ab679e8bb5a81a4f922d3efbd43e32bce69274 - Patch
References () https://git.kernel.org/stable/c/47d253c485491caaf70d8cd8c0248ae26e42581f - () https://git.kernel.org/stable/c/47d253c485491caaf70d8cd8c0248ae26e42581f - Patch
References () https://git.kernel.org/stable/c/518d5ddafeb084d6d9b1773ed85164300037d0e6 - () https://git.kernel.org/stable/c/518d5ddafeb084d6d9b1773ed85164300037d0e6 - Patch
References () https://git.kernel.org/stable/c/76aa2440deb9a35507590f2c981a69a57ecd305d - () https://git.kernel.org/stable/c/76aa2440deb9a35507590f2c981a69a57ecd305d - Patch
References () https://git.kernel.org/stable/c/a0cedbcc8852d6c77b00634b81e41f17f29d9404 - () https://git.kernel.org/stable/c/a0cedbcc8852d6c77b00634b81e41f17f29d9404 - Patch
References () https://git.kernel.org/stable/c/c7e02ccc9fdc496fe51e440e3e66ac36509ca049 - () https://git.kernel.org/stable/c/c7e02ccc9fdc496fe51e440e3e66ac36509ca049 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List

Information

Published : 2024-05-30 16:15

Updated : 2025-01-14 15:38


NVD link : CVE-2024-36959

Mitre link : CVE-2024-36959

CVE.ORG link : CVE-2024-36959


JSON object : View

Products Affected

linux

  • linux_kernel