ppdev: Add an error check in register_device
In register_device, the return value of ida_simple_get is unchecked,
in witch ida_simple_get will use an invalid index value.
To address this issue, index should be checked after ida_simple_get. When
the index value is abnormal, a warning message should be printed, the port
should be dropped, and the value should be recorded.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3840-1 | linux security update |
Debian DSA |
DSA-5730-1 | linux security update |
Ubuntu USN |
USN-6951-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6951-2 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-6951-3 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-6951-4 | Linux kernel (BlueField) vulnerabilities |
Ubuntu USN |
USN-6953-1 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-6979-1 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-6999-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6999-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7004-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7005-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7005-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7007-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7007-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7007-3 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7008-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7009-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7009-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7019-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7029-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7496-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7496-2 | Linux kernel (FIPS) vulnerabilities |
Ubuntu USN |
USN-7496-3 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7496-4 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7496-5 | Linux kernel (Azure FIPS) vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 04 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 18 Sep 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linux
Linux linux Kernel |
|
| Weaknesses | CWE-129 | |
| CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.11:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.11:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.11:rc8:*:*:*:*:*:* |
|
| Vendors & Products |
Linux
Linux linux Kernel |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Sun, 04 May 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 Nov 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
Wed, 11 Sep 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Sep 2024 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-11-04T17:20:56.337Z
Reserved: 2024-05-17T13:50:33.154Z
Link: CVE-2024-36015
Updated: 2025-11-04T17:20:56.337Z
Status : Modified
Published: 2024-05-29T08:15:33.880
Modified: 2025-11-04T18:16:23.557
Link: CVE-2024-36015
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN