In the Linux kernel, the following vulnerability has been resolved:
SUNRPC: Fix loop termination condition in gssfreeintokenpages()
The in_token->pages[] array is not NULL terminated. This results in the following KASAN splat:
KASAN: maybe wild-memory-access in range [0x04a2013400000008-0x04a201340000000f]
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/36xxx/CVE-2024-36288.json",
"cna_assigner": "Linux"
}