In the Linux kernel, the following vulnerability has been resolved:
SUNRPC: Fix loop termination condition in gss_free_in_token_pages()
The in_token->pages[] array is not NULL terminated. This results in
the following KASAN splat:
KASAN: maybe wild-memory-access in range [0x04a2013400000008-0x04a201340000000f]
Metrics
Affected Vendors & Products
References
History
Tue, 04 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sun, 04 May 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Linux
Published: 2024-06-21T11:18:46.152Z
Updated: 2025-11-04T17:21:10.146Z
Reserved: 2024-06-21T11:16:40.621Z
Link: CVE-2024-36288
Updated: 2025-11-04T17:21:10.146Z
Status : Modified
Published: 2024-06-21T12:15:10.967
Modified: 2025-11-04T18:16:24.977
Link: CVE-2024-36288