| { |
| "containers": { |
| "cna": { |
| "providerMetadata": { |
| "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038" |
| }, |
| "descriptions": [ |
| { |
| "lang": "en", |
| "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map()\n\nIf we fail to allocate propname buffer, we need to drop the reference\ncount we just took. Because the pinctrl_dt_free_maps() includes the\ndroping operation, here we call it directly." |
| } |
| ], |
| "affected": [ |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "unaffected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "drivers/pinctrl/devicetree.c" |
| ], |
| "versions": [ |
| { |
| "version": "a988dcd3dd9e691c5ccc3324b209688f3b5453e9", |
| "lessThan": "06780473cb8a858d1d6cab2673e021b072a852d1", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "040f726fecd88121f3b95e70369785ad452dddf9", |
| "lessThan": "47d253c485491caaf70d8cd8c0248ae26e42581f", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "777430aa4ddccaa5accec6db90ffc1d47f00d471", |
| "lessThan": "35ab679e8bb5a81a4f922d3efbd43e32bce69274", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "97e5b508e96176f1a73888ed89df396d7041bfcb", |
| "lessThan": "76aa2440deb9a35507590f2c981a69a57ecd305d", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "91d5c5060ee24fe8da88cd585bb43b843d2f0dce", |
| "lessThan": "518d5ddafeb084d6d9b1773ed85164300037d0e6", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "91d5c5060ee24fe8da88cd585bb43b843d2f0dce", |
| "lessThan": "026e24cf31733dbd97f41cc9bc5273ace428eeec", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "91d5c5060ee24fe8da88cd585bb43b843d2f0dce", |
| "lessThan": "c7e02ccc9fdc496fe51e440e3e66ac36509ca049", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "91d5c5060ee24fe8da88cd585bb43b843d2f0dce", |
| "lessThan": "a0cedbcc8852d6c77b00634b81e41f17f29d9404", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "aaf552c5d53abe4659176e099575fe870d2e4768", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "b4d9f55cd38435358bc16d580612bc0d798d7b4c", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "5834a3a98cd266ad35a229923c0adbd0addc8d68", |
| "status": "affected", |
| "versionType": "git" |
| } |
| ] |
| }, |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "affected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "drivers/pinctrl/devicetree.c" |
| ], |
| "versions": [ |
| { |
| "version": "6.1", |
| "status": "affected" |
| }, |
| { |
| "version": "0", |
| "lessThan": "6.1", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "4.19.314", |
| "lessThanOrEqual": "4.19.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.4.276", |
| "lessThanOrEqual": "5.4.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.10.217", |
| "lessThanOrEqual": "5.10.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.15.159", |
| "lessThanOrEqual": "5.15.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.1.91", |
| "lessThanOrEqual": "6.1.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.6.31", |
| "lessThanOrEqual": "6.6.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.8.10", |
| "lessThanOrEqual": "6.8.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.9", |
| "lessThanOrEqual": "*", |
| "status": "unaffected", |
| "versionType": "original_commit_for_fix" |
| } |
| ] |
| } |
| ], |
| "cpeApplicability": [ |
| { |
| "nodes": [ |
| { |
| "operator": "OR", |
| "negate": false, |
| "cpeMatch": [ |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.19.267", |
| "versionEndExcluding": "4.19.314" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.4.225", |
| "versionEndExcluding": "5.4.276" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.10.156", |
| "versionEndExcluding": "5.10.217" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.15.80", |
| "versionEndExcluding": "5.15.159" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.1", |
| "versionEndExcluding": "6.1.91" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.1", |
| "versionEndExcluding": "6.6.31" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.1", |
| "versionEndExcluding": "6.8.10" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.1", |
| "versionEndExcluding": "6.9" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.9.334" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.14.300" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.0.10" |
| } |
| ] |
| } |
| ] |
| } |
| ], |
| "references": [ |
| { |
| "url": "https://git.kernel.org/stable/c/06780473cb8a858d1d6cab2673e021b072a852d1" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/47d253c485491caaf70d8cd8c0248ae26e42581f" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/35ab679e8bb5a81a4f922d3efbd43e32bce69274" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/76aa2440deb9a35507590f2c981a69a57ecd305d" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/518d5ddafeb084d6d9b1773ed85164300037d0e6" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/026e24cf31733dbd97f41cc9bc5273ace428eeec" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/c7e02ccc9fdc496fe51e440e3e66ac36509ca049" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/a0cedbcc8852d6c77b00634b81e41f17f29d9404" |
| } |
| ], |
| "title": "pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map()", |
| "x_generator": { |
| "engine": "bippy-1.2.0" |
| } |
| } |
| }, |
| "cveMetadata": { |
| "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038", |
| "cveID": "CVE-2024-36959", |
| "requesterUserId": "gregkh@kernel.org", |
| "serial": "1", |
| "state": "PUBLISHED" |
| }, |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0" |
| } |