CVSS 3.1 Score 5.5 of 10 (medium)


Published Jun 21, 2024
Updated: Jun 27, 2024
CWE ID 835


The vulnerability with the CVE ID CVE-2024-36288 affects the Linux kernel. It has a base severity of MEDIUM and a base score of 5.5. The exploitability score is 1.8, indicating a relatively low likelihood of exploitation. The vulnerability has a local attack vector and requires low privileges to exploit. There is no user interaction required for exploitation, and it does not impact integrity or confidentiality. The availability impact, however, is high. The vulnerability involves a loop termination condition in gss_free_in_token_pages() in the SUNRPC component of the Linux kernel, resulting in a KASAN splat and potential wild memory access. There is no information provided on how to remediate the vulnerability or its potential danger to organizations affected by it. The information is sourced from [email protected] and there is no further analysis provided for this vulnerability.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.


Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-36288 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions