CVE-2024-36975

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/06/2024
Last modified:
01/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> KEYS: trusted: Do not use WARN when encode fails<br /> <br /> When asn1_encode_sequence() fails, WARN is not the correct solution.<br /> <br /> 1. asn1_encode_sequence() is not an internal function (located<br /> in lib/asn1_encode.c).<br /> 2. Location is known, which makes the stack trace useless.<br /> 3. Results a crash if panic_on_warn is set.<br /> <br /> It is also noteworthy that the use of WARN is undocumented, and it<br /> should be avoided unless there is a carefully considered rationale to<br /> use it.<br /> <br /> Replace WARN with pr_err, and print the return value instead, which is<br /> only useful piece of information.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.13 (including) 5.15.160 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.92 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.32 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.8.11 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.9 (including) 6.9.2 (excluding)