CVE-2024-36015

In the Linux kernel, the following vulnerability has been resolved: ppdev: Add an error check in register_device In register_device, the return value of ida_simple_get is unchecked, in witch ida_simple_get will use an invalid index value. To address this issue, index should be checked after ida_simple_get. When the index value is abnormal, a warning message should be printed, the port should be dropped, and the value should be recorded.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.11:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.11:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.11:rc8:*:*:*:*:*:*

History

18 Sep 2025, 15:50

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.11:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.11:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.11:rc8:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/5d5b24edad1107a2ffa99058f20f6aeeafeb5d39 - () https://git.kernel.org/stable/c/5d5b24edad1107a2ffa99058f20f6aeeafeb5d39 - Patch
References () https://git.kernel.org/stable/c/65cd017d43f4319a56747d38308b0a24cf57299e - () https://git.kernel.org/stable/c/65cd017d43f4319a56747d38308b0a24cf57299e - Patch
References () https://git.kernel.org/stable/c/b65d0410b879af0295d22438a4a32012786d152a - () https://git.kernel.org/stable/c/b65d0410b879af0295d22438a4a32012786d152a - Patch
References () https://git.kernel.org/stable/c/b8c6b83cc3adff3ddf403c8c7063fe6d08b2b9d9 - () https://git.kernel.org/stable/c/b8c6b83cc3adff3ddf403c8c7063fe6d08b2b9d9 - Patch
References () https://git.kernel.org/stable/c/d32caf51379a4d71db03d3d4d7c22d27cdf7f68b - () https://git.kernel.org/stable/c/d32caf51379a4d71db03d3d4d7c22d27cdf7f68b - Patch
References () https://git.kernel.org/stable/c/df9329247dbbf00f6057e002139ab3fa529ad828 - () https://git.kernel.org/stable/c/df9329247dbbf00f6057e002139ab3fa529ad828 - Patch
References () https://git.kernel.org/stable/c/ec3468221efec6660ff656e9ebe51ced3520fc57 - () https://git.kernel.org/stable/c/ec3468221efec6660ff656e9ebe51ced3520fc57 - Patch
References () https://git.kernel.org/stable/c/fbf740aeb86a4fe82ad158d26d711f2f3be79b3e - () https://git.kernel.org/stable/c/fbf740aeb86a4fe82ad158d26d711f2f3be79b3e - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-129
First Time Linux
Linux linux Kernel

21 Nov 2024, 09:21

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/5d5b24edad1107a2ffa99058f20f6aeeafeb5d39 - () https://git.kernel.org/stable/c/5d5b24edad1107a2ffa99058f20f6aeeafeb5d39 -
References () https://git.kernel.org/stable/c/65cd017d43f4319a56747d38308b0a24cf57299e - () https://git.kernel.org/stable/c/65cd017d43f4319a56747d38308b0a24cf57299e -
References () https://git.kernel.org/stable/c/b65d0410b879af0295d22438a4a32012786d152a - () https://git.kernel.org/stable/c/b65d0410b879af0295d22438a4a32012786d152a -
References () https://git.kernel.org/stable/c/b8c6b83cc3adff3ddf403c8c7063fe6d08b2b9d9 - () https://git.kernel.org/stable/c/b8c6b83cc3adff3ddf403c8c7063fe6d08b2b9d9 -
References () https://git.kernel.org/stable/c/d32caf51379a4d71db03d3d4d7c22d27cdf7f68b - () https://git.kernel.org/stable/c/d32caf51379a4d71db03d3d4d7c22d27cdf7f68b -
References () https://git.kernel.org/stable/c/df9329247dbbf00f6057e002139ab3fa529ad828 - () https://git.kernel.org/stable/c/df9329247dbbf00f6057e002139ab3fa529ad828 -
References () https://git.kernel.org/stable/c/ec3468221efec6660ff656e9ebe51ced3520fc57 - () https://git.kernel.org/stable/c/ec3468221efec6660ff656e9ebe51ced3520fc57 -
References () https://git.kernel.org/stable/c/fbf740aeb86a4fe82ad158d26d711f2f3be79b3e - () https://git.kernel.org/stable/c/fbf740aeb86a4fe82ad158d26d711f2f3be79b3e -

15 Jul 2024, 07:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 12:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

16 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/65cd017d43f4319a56747d38308b0a24cf57299e -
  • () https://git.kernel.org/stable/c/b65d0410b879af0295d22438a4a32012786d152a -
  • () https://git.kernel.org/stable/c/b8c6b83cc3adff3ddf403c8c7063fe6d08b2b9d9 -
  • () https://git.kernel.org/stable/c/d32caf51379a4d71db03d3d4d7c22d27cdf7f68b -

12 Jun 2024, 10:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/5d5b24edad1107a2ffa99058f20f6aeeafeb5d39 -
  • () https://git.kernel.org/stable/c/df9329247dbbf00f6057e002139ab3fa529ad828 -
  • () https://git.kernel.org/stable/c/ec3468221efec6660ff656e9ebe51ced3520fc57 -

29 May 2024, 13:02

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ppdev: agregue una verificación de errores en Register_device. En Register_device, el valor de retorno de ida_simple_get no está marcado, por lo que ida_simple_get usará un valor de índice no válido. Para solucionar este problema, se debe verificar el índice después de ida_simple_get. Cuando el valor del índice es anormal, se debe imprimir un mensaje de advertencia, se debe descartar el puerto y se debe registrar el valor.

29 May 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-29 08:15

Updated : 2025-09-18 15:50


NVD link : CVE-2024-36015

Mitre link : CVE-2024-36015

CVE.ORG link : CVE-2024-36015


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-129

Improper Validation of Array Index