{"id":"CVE-2024-36959","summary":"pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map()\n\nIf we fail to allocate propname buffer, we need to drop the reference\ncount we just took. Because the pinctrl_dt_free_maps() includes the\ndroping operation, here we call it directly.","modified":"2026-04-02T12:16:35.416695Z","published":"2024-05-30T15:35:51.624Z","related":["MGASA-2024-0263","MGASA-2024-0266","SUSE-SU-2024:2008-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2135-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2203-1","SUSE-SU-2024:2802-1","SUSE-SU-2024:2894-1","SUSE-SU-2024:2896-1","SUSE-SU-2024:2947-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:02334-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20249-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/36xxx/CVE-2024-36959.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/026e24cf31733dbd97f41cc9bc5273ace428eeec"},{"type":"WEB","url":"https://git.kernel.org/stable/c/06780473cb8a858d1d6cab2673e021b072a852d1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/35ab679e8bb5a81a4f922d3efbd43e32bce69274"},{"type":"WEB","url":"https://git.kernel.org/stable/c/47d253c485491caaf70d8cd8c0248ae26e42581f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/518d5ddafeb084d6d9b1773ed85164300037d0e6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/76aa2440deb9a35507590f2c981a69a57ecd305d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a0cedbcc8852d6c77b00634b81e41f17f29d9404"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c7e02ccc9fdc496fe51e440e3e66ac36509ca049"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/36xxx/CVE-2024-36959.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36959"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"a988dcd3dd9e691c5ccc3324b209688f3b5453e9"},{"fixed":"06780473cb8a858d1d6cab2673e021b072a852d1"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"040f726fecd88121f3b95e70369785ad452dddf9"},{"fixed":"47d253c485491caaf70d8cd8c0248ae26e42581f"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"777430aa4ddccaa5accec6db90ffc1d47f00d471"},{"fixed":"35ab679e8bb5a81a4f922d3efbd43e32bce69274"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"97e5b508e96176f1a73888ed89df396d7041bfcb"},{"fixed":"76aa2440deb9a35507590f2c981a69a57ecd305d"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"91d5c5060ee24fe8da88cd585bb43b843d2f0dce"},{"fixed":"518d5ddafeb084d6d9b1773ed85164300037d0e6"},{"fixed":"026e24cf31733dbd97f41cc9bc5273ace428eeec"},{"fixed":"c7e02ccc9fdc496fe51e440e3e66ac36509ca049"},{"fixed":"a0cedbcc8852d6c77b00634b81e41f17f29d9404"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"aaf552c5d53abe4659176e099575fe870d2e4768"},{"last_affected":"b4d9f55cd38435358bc16d580612bc0d798d7b4c"},{"last_affected":"5834a3a98cd266ad35a229923c0adbd0addc8d68"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-36959.json"}}],"schema_version":"1.7.5"}