Lucene search

K
cveLinuxCVE-2024-36288
HistoryJun 21, 2024 - 12:15 p.m.

CVE-2024-36288

2024-06-2112:15:10
CWE-835
Linux
web.nvd.nist.gov
113
linux kernel
sunrpc
vulnerability

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.5

Confidence

Low

EPSS

0

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: Fix loop termination condition in gss_free_in_token_pages()

The in_token->pages[] array is not NULL terminated. This results in
the following KASAN splat:

KASAN: maybe wild-memory-access in range [0x04a2013400000008-0x04a201340000000f]

Affected configurations

Nvd
Vulners
Node
linuxlinux_kernelRange<6.9.4
OR
linuxlinux_kernelMatch6.10.0rc1
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linuxlinux_kernel6.10.0cpe:2.3:o:linux:linux_kernel:6.10.0:rc1:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "net/sunrpc/auth_gss/svcauth_gss.c"
    ],
    "versions": [
      {
        "version": "ab8466d4e268",
        "lessThan": "57ff6c0a1759",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "4420b73c7f26",
        "lessThan": "6ed45d20d300",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "f148a95f68c6",
        "lessThan": "4cefcd0af745",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "fe0b474974fe",
        "lessThan": "b4878ea99f2b",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "879fe60fccd5",
        "lessThan": "f9977e4e0cd9",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "c1d8c429e4d2",
        "lessThan": "af628d43a822",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "8ca148915670",
        "lessThan": "0a1cb0c6102b",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "bafa6b4d95d9",
        "lessThan": "4a77c3dead97",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "net/sunrpc/auth_gss/svcauth_gss.c"
    ],
    "versions": [
      {
        "version": "6.9.3",
        "lessThan": "6.9.4",
        "status": "affected",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.5

Confidence

Low

EPSS

0

Percentile

5.1%