CVE-2024-56562

In the Linux kernel, the following vulnerability has been resolved: i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() if (dev->boardinfo && dev->boardinfo->init_dyn_addr) ^^^ here check "init_dyn_addr" i3c_bus_set_addr_slot_status(&master->bus, dev->info.dyn_addr, ...) ^^^^ free "dyn_addr" Fix copy/paste error "dyn_addr" by replacing it with "init_dyn_addr".
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

07 Oct 2025, 18:14

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: i3c: master: Se corrige la falta de liberación de init_dyn_addr en i3c_master_put_i3c_addrs() if (dev->boardinfo && dev->boardinfo->init_dyn_addr) ^^^ aquí comprobar "init_dyn_addr" i3c_bus_set_addr_slot_status(&master->bus, dev->info.dyn_addr, ...) ^^^^ libera "dyn_addr" Se corrige el error de copiar/pegar "dyn_addr" reemplazándolo por "init_dyn_addr".
References () https://git.kernel.org/stable/c/093ecc6d82ff1d2e0cbf6f2000438b6c698145cb - () https://git.kernel.org/stable/c/093ecc6d82ff1d2e0cbf6f2000438b6c698145cb - Patch
References () https://git.kernel.org/stable/c/0cb21f1ea3a2e19ee314a8fcf95461b5c453c59e - () https://git.kernel.org/stable/c/0cb21f1ea3a2e19ee314a8fcf95461b5c453c59e - Patch
References () https://git.kernel.org/stable/c/0e8ab955c6d06f9d907761c07c02d1492f0a8ac1 - () https://git.kernel.org/stable/c/0e8ab955c6d06f9d907761c07c02d1492f0a8ac1 - Patch
References () https://git.kernel.org/stable/c/3082990592f7c6d7510a9133afa46e31bbe26533 - () https://git.kernel.org/stable/c/3082990592f7c6d7510a9133afa46e31bbe26533 - Patch
References () https://git.kernel.org/stable/c/991e33a99fd3b5d432f0629565f532f563fe019a - () https://git.kernel.org/stable/c/991e33a99fd3b5d432f0629565f532f563fe019a - Patch
References () https://git.kernel.org/stable/c/c2f0ce241154b04f2fc150ff16ad82d9b8fdfa4a - () https://git.kernel.org/stable/c/c2f0ce241154b04f2fc150ff16ad82d9b8fdfa4a - Patch
References () https://git.kernel.org/stable/c/ce30d11b39e8d637fed4704a5b43e9d556990475 - () https://git.kernel.org/stable/c/ce30d11b39e8d637fed4704a5b43e9d556990475 - Patch
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

27 Dec 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-27 15:15

Updated : 2025-10-07 18:14


NVD link : CVE-2024-56562

Mitre link : CVE-2024-56562

CVE.ORG link : CVE-2024-56562


JSON object : View

Products Affected

linux

  • linux_kernel