In the Linux kernel, the following vulnerability has been resolved:
ppdev: Add an error check in register_device
In register_device, the return value of ida_simple_get is unchecked,
in witch ida_simple_get will use an invalid index value.
To address this issue, index should be checked after ida_simple_get. When
the index value is abnormal, a warning message should be printed, the port
should be dropped, and the value should be recorded.
References
Configurations
Configuration 1 (hide)
|
History
18 Sep 2025, 15:50
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.11:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.11:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.11:rc8:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/5d5b24edad1107a2ffa99058f20f6aeeafeb5d39 - Patch | |
References | () https://git.kernel.org/stable/c/65cd017d43f4319a56747d38308b0a24cf57299e - Patch | |
References | () https://git.kernel.org/stable/c/b65d0410b879af0295d22438a4a32012786d152a - Patch | |
References | () https://git.kernel.org/stable/c/b8c6b83cc3adff3ddf403c8c7063fe6d08b2b9d9 - Patch | |
References | () https://git.kernel.org/stable/c/d32caf51379a4d71db03d3d4d7c22d27cdf7f68b - Patch | |
References | () https://git.kernel.org/stable/c/df9329247dbbf00f6057e002139ab3fa529ad828 - Patch | |
References | () https://git.kernel.org/stable/c/ec3468221efec6660ff656e9ebe51ced3520fc57 - Patch | |
References | () https://git.kernel.org/stable/c/fbf740aeb86a4fe82ad158d26d711f2f3be79b3e - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CWE | CWE-129 | |
First Time |
Linux
Linux linux Kernel |
21 Nov 2024, 09:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/5d5b24edad1107a2ffa99058f20f6aeeafeb5d39 - | |
References | () https://git.kernel.org/stable/c/65cd017d43f4319a56747d38308b0a24cf57299e - | |
References | () https://git.kernel.org/stable/c/b65d0410b879af0295d22438a4a32012786d152a - | |
References | () https://git.kernel.org/stable/c/b8c6b83cc3adff3ddf403c8c7063fe6d08b2b9d9 - | |
References | () https://git.kernel.org/stable/c/d32caf51379a4d71db03d3d4d7c22d27cdf7f68b - | |
References | () https://git.kernel.org/stable/c/df9329247dbbf00f6057e002139ab3fa529ad828 - | |
References | () https://git.kernel.org/stable/c/ec3468221efec6660ff656e9ebe51ced3520fc57 - | |
References | () https://git.kernel.org/stable/c/fbf740aeb86a4fe82ad158d26d711f2f3be79b3e - |
15 Jul 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Jun 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Jun 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Jun 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 May 2024, 13:02
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
29 May 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-29 08:15
Updated : 2025-09-18 15:50
NVD link : CVE-2024-36015
Mitre link : CVE-2024-36015
CVE.ORG link : CVE-2024-36015
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-129
Improper Validation of Array Index