cve/2024/CVE-2024-36959.md
2025-09-29 21:09:30 +02:00

27 lines
1.8 KiB
Markdown

### [CVE-2024-36959](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36959)
![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=040f726fecd88121f3b95e70369785ad452dddf9%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5834a3a98cd266ad35a229923c0adbd0addc8d68%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=777430aa4ddccaa5accec6db90ffc1d47f00d471%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=91d5c5060ee24fe8da88cd585bb43b843d2f0dce%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=97e5b508e96176f1a73888ed89df396d7041bfcb%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=a988dcd3dd9e691c5ccc3324b209688f3b5453e9%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=aaf552c5d53abe4659176e099575fe870d2e4768%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=b4d9f55cd38435358bc16d580612bc0d798d7b4c%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue)
### Description
In the Linux kernel, the following vulnerability has been resolved:pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map()If we fail to allocate propname buffer, we need to drop the referencecount we just took. Because the pinctrl_dt_free_maps() includes thedroping operation, here we call it directly.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds