In the Linux kernel, the following vulnerability has been resolved:
KEYS: trusted: Do not use WARN when encode fails
When asn1_encode_sequence() fails, WARN is not the correct solution.
1. asn1_encode_sequence() is not an internal function (located
   in lib/asn1_encode.c).
2. Location is known, which makes the stack trace useless.
3. Results a crash if panic_on_warn is set.
It is also noteworthy that the use of WARN is undocumented, and it
should be avoided unless there is a carefully considered rationale to
use it.
Replace WARN with pr_err, and print the return value instead, which is
only useful piece of information.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 01 Oct 2025 15:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 
Tue, 05 Nov 2024 10:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Wed, 11 Sep 2024 18:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Wed, 11 Sep 2024 13:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Linux
Published: 2024-06-18T19:20:24.553Z
Updated: 2025-05-04T09:13:11.226Z
Reserved: 2024-05-30T15:25:07.082Z
Link: CVE-2024-36975
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-02T03:43:50.595Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-06-18T20:15:13.340
Modified: 2025-10-01T15:16:46.040
Link: CVE-2024-36975
 Redhat
                        Redhat