In the Linux kernel, the following vulnerability has been resolved:
SUNRPC: Fix loop termination condition in gssfreeintokenpages()
The in_token->pages[] array is not NULL terminated. This results in the following KASAN splat:
KASAN: maybe wild-memory-access in range [0x04a2013400000008-0x04a201340000000f]
[
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"311139741778795616083194782083604215121",
"130858738463338361933590471468452848627",
"126239674380037317961688590174587409373",
"194088751693116406490462385400802046314"
]
},
"id": "CVE-2024-36288-52b84d7d",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@af628d43a822b78ad8d4a58d8259f8bf8bc71115",
"target": {
"file": "net/sunrpc/auth_gss/svcauth_gss.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 1432.0,
"function_hash": "229155821256406773821255188832025926410"
},
"id": "CVE-2024-36288-539a8397",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@af628d43a822b78ad8d4a58d8259f8bf8bc71115",
"target": {
"file": "net/sunrpc/auth_gss/svcauth_gss.c",
"function": "gss_read_proxy_verf"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 1456.0,
"function_hash": "39802185571439213896949102975527657528"
},
"id": "CVE-2024-36288-70ea07ad",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4cefcd0af7458bdeff56a9d8dfc6868ce23d128a",
"target": {
"file": "net/sunrpc/auth_gss/svcauth_gss.c",
"function": "gss_read_proxy_verf"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"8817058910376433909574342542057220677",
"139453982263812218296901084793369074809",
"103185807451978818567566892051793738891",
"78221428928200349196915001499197313134"
]
},
"id": "CVE-2024-36288-8cf80b96",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4cefcd0af7458bdeff56a9d8dfc6868ce23d128a",
"target": {
"file": "net/sunrpc/auth_gss/svcauth_gss.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"311139741778795616083194782083604215121",
"130858738463338361933590471468452848627",
"126239674380037317961688590174587409373",
"194088751693116406490462385400802046314"
]
},
"id": "CVE-2024-36288-befc741b",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4a77c3dead97339478c7422eb07bf4bf63577008",
"target": {
"file": "net/sunrpc/auth_gss/svcauth_gss.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 1432.0,
"function_hash": "229155821256406773821255188832025926410"
},
"id": "CVE-2024-36288-d73b1af1",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4a77c3dead97339478c7422eb07bf4bf63577008",
"target": {
"file": "net/sunrpc/auth_gss/svcauth_gss.c",
"function": "gss_read_proxy_verf"
}
}
]