In the Linux kernel, the following vulnerability has been resolved:
pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map()
If we fail to allocate propname buffer, we need to drop the reference
count we just took. Because the pinctrl_dt_free_maps() includes the
droping operation, here we call it directly.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/a0cedbcc8852d6c77b00634b81e41f17f29d9404 (6.9-rc7)
git.kernel.org/stable/c/026e24cf31733dbd97f41cc9bc5273ace428eeec
git.kernel.org/stable/c/06780473cb8a858d1d6cab2673e021b072a852d1
git.kernel.org/stable/c/35ab679e8bb5a81a4f922d3efbd43e32bce69274
git.kernel.org/stable/c/47d253c485491caaf70d8cd8c0248ae26e42581f
git.kernel.org/stable/c/518d5ddafeb084d6d9b1773ed85164300037d0e6
git.kernel.org/stable/c/76aa2440deb9a35507590f2c981a69a57ecd305d
git.kernel.org/stable/c/a0cedbcc8852d6c77b00634b81e41f17f29d9404
git.kernel.org/stable/c/c7e02ccc9fdc496fe51e440e3e66ac36509ca049
launchpad.net/bugs/cve/CVE-2024-36959
nvd.nist.gov/vuln/detail/CVE-2024-36959
security-tracker.debian.org/tracker/CVE-2024-36959
www.cve.org/CVERecord?id=CVE-2024-36959