In the Linux kernel, the following vulnerability has been resolved:
SUNRPC: Fix loop termination condition in gss_free_in_token_pages()
The in_token->pages[] array is not NULL terminated. This results in
the following KASAN splat:
KASAN: maybe wild-memory-access in range [0x04a2013400000008-0x04a201340000000f]
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-06-21T11:18:46.152Z
Updated: 2024-11-05T09:27:15.100Z
Reserved: 2024-06-21T11:16:40.621Z
Link: CVE-2024-36288
Vulnrichment
Updated: 2024-08-02T03:37:04.682Z
NVD
Status : Modified
Published: 2024-06-21T12:15:10.967
Modified: 2024-07-15T07:15:05.230
Link: CVE-2024-36288
Redhat