{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2024-36940","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-05-30T15:25:07.072Z","datePublished":"2024-05-30T15:29:28.101Z","dateUpdated":"2026-05-12T11:54:19.300Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T20:17:27.126Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: core: delete incorrect free in pinctrl_enable()\n\nThe \"pctldev\" struct is allocated in devm_pinctrl_register_and_init().\nIt's a devm_ managed pointer that is freed by devm_pinctrl_dev_release(),\nso freeing it in pinctrl_enable() will lead to a double free.\n\nThe devm_pinctrl_dev_release() function frees the pindescs and destroys\nthe mutex as well."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/pinctrl/core.c"],"versions":[{"version":"6118714275f0a313ecc296a87ed1af32d9691bed","lessThan":"735f4c6b6771eafe336404c157ca683ad72a040d","status":"affected","versionType":"git"},{"version":"6118714275f0a313ecc296a87ed1af32d9691bed","lessThan":"cdaa171473d98962ae86f2a663d398fda2fbeefd","status":"affected","versionType":"git"},{"version":"6118714275f0a313ecc296a87ed1af32d9691bed","lessThan":"288bc4aa75f150d6f1ee82dd43c6da1b438b6068","status":"affected","versionType":"git"},{"version":"6118714275f0a313ecc296a87ed1af32d9691bed","lessThan":"41f88ef8ba387a12f4a2b8c400b6c9e8e54b2cca","status":"affected","versionType":"git"},{"version":"6118714275f0a313ecc296a87ed1af32d9691bed","lessThan":"ac7d65795827dc0cf7662384ed27caf4066bd72e","status":"affected","versionType":"git"},{"version":"6118714275f0a313ecc296a87ed1af32d9691bed","lessThan":"558c8039fdf596a584a92c171cbf3298919c448c","status":"affected","versionType":"git"},{"version":"6118714275f0a313ecc296a87ed1af32d9691bed","lessThan":"f9f1e321d53e4c5b666b66e5b43da29841fb55ba","status":"affected","versionType":"git"},{"version":"6118714275f0a313ecc296a87ed1af32d9691bed","lessThan":"5038a66dad0199de60e5671603ea6623eb9e5c79","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/pinctrl/core.c"],"versions":[{"version":"4.11","status":"affected"},{"version":"0","lessThan":"4.11","status":"unaffected","versionType":"semver"},{"version":"4.19.314","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.276","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.217","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.159","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.91","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.31","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.8.10","lessThanOrEqual":"6.8.*","status":"unaffected","versionType":"semver"},{"version":"6.9","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"4.19.314"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"5.4.276"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"5.10.217"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"5.15.159"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"6.1.91"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"6.6.31"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"6.8.10"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"6.9"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/735f4c6b6771eafe336404c157ca683ad72a040d"},{"url":"https://git.kernel.org/stable/c/cdaa171473d98962ae86f2a663d398fda2fbeefd"},{"url":"https://git.kernel.org/stable/c/288bc4aa75f150d6f1ee82dd43c6da1b438b6068"},{"url":"https://git.kernel.org/stable/c/41f88ef8ba387a12f4a2b8c400b6c9e8e54b2cca"},{"url":"https://git.kernel.org/stable/c/ac7d65795827dc0cf7662384ed27caf4066bd72e"},{"url":"https://git.kernel.org/stable/c/558c8039fdf596a584a92c171cbf3298919c448c"},{"url":"https://git.kernel.org/stable/c/f9f1e321d53e4c5b666b66e5b43da29841fb55ba"},{"url":"https://git.kernel.org/stable/c/5038a66dad0199de60e5671603ea6623eb9e5c79"}],"title":"pinctrl: core: delete incorrect free in pinctrl_enable()","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-06-05T14:25:26.979822Z","id":"CVE-2024-36940","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-05T14:25:33.588Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T03:43:50.606Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/735f4c6b6771eafe336404c157ca683ad72a040d","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/cdaa171473d98962ae86f2a663d398fda2fbeefd","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/288bc4aa75f150d6f1ee82dd43c6da1b438b6068","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/41f88ef8ba387a12f4a2b8c400b6c9e8e54b2cca","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/ac7d65795827dc0cf7662384ed27caf4066bd72e","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/558c8039fdf596a584a92c171cbf3298919c448c","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/f9f1e321d53e4c5b666b66e5b43da29841fb55ba","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/5038a66dad0199de60e5671603ea6623eb9e5c79","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html","tags":["x_transferred"]}]},{"x_adpType":"supplier","providerMetadata":{"orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP","dateUpdated":"2026-05-12T11:54:19.300Z"},"affected":[{"vendor":"Siemens","product":"RUGGEDCOM RST2428P","versions":[{"status":"affected","version":"0","lessThan":"V3.1","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family","versions":[{"status":"unaffected","version":"0","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE XCM-/XRM-/XCH-/XRH-300 family","versions":[{"status":"affected","version":"0","lessThan":"V3.1","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMATIC S7-1500 TM MFP - GNU/Linux subsystem","versions":[{"status":"affected","version":"0","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"}],"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-265688.html"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-613116.html"}]}]},"dataVersion":"5.2"}