In the Linux kernel, the following vulnerability has been resolved:
KEYS: trusted: Do not use WARN when encode fails
When asn1_encode_sequence() fails, WARN is not the correct solution.
1. asn1_encode_sequence() is not an internal function (located
in lib/asn1_encode.c).
2. Location is known, which makes the stack trace useless.
3. Results a crash if panic_on_warn is set.
It is also noteworthy that the use of WARN is undocumented, and it
should be avoided unless there is a carefully considered rationale to
use it.
Replace WARN with pr_err, and print the return value instead, which is
only useful piece of information.
Metrics
Affected Vendors & Products
References
History
Tue, 05 Nov 2024 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 11 Sep 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-06-18T19:20:24.553Z
Updated: 2024-11-05T09:29:10.167Z
Reserved: 2024-05-30T15:25:07.082Z
Link: CVE-2024-36975
Vulnrichment
Updated: 2024-08-02T03:43:50.595Z
NVD
Status : Awaiting Analysis
Published: 2024-06-18T20:15:13.340
Modified: 2024-06-20T12:44:01.637
Link: CVE-2024-36975
Redhat