CVE-2024-56754

In the Linux kernel, the following vulnerability has been resolved: crypto: caam - Fix the pointer passed to caam_qi_shutdown() The type of the last parameter given to devm_add_action_or_reset() is "struct caam_drv_private *", but in caam_qi_shutdown(), it is casted to "struct device *". Pass the correct parameter to devm_add_action_or_reset() so that the resources are released as expected.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

06 Jan 2025, 19:39

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/1f8e2f597b918ca5827a5c6d00b819d064264d1c - () https://git.kernel.org/stable/c/1f8e2f597b918ca5827a5c6d00b819d064264d1c - Patch
References () https://git.kernel.org/stable/c/6187727e57aec122c8a99c464c74578c810cbe40 - () https://git.kernel.org/stable/c/6187727e57aec122c8a99c464c74578c810cbe40 - Patch
References () https://git.kernel.org/stable/c/66eddb8dcb61065c53098510165f14b54232bcc2 - () https://git.kernel.org/stable/c/66eddb8dcb61065c53098510165f14b54232bcc2 - Patch
References () https://git.kernel.org/stable/c/84a185aea7b83f620699de0ea36907d588d89cf6 - () https://git.kernel.org/stable/c/84a185aea7b83f620699de0ea36907d588d89cf6 - Patch
References () https://git.kernel.org/stable/c/ad39df0898d3f469776c19d99229be055cc2dcea - () https://git.kernel.org/stable/c/ad39df0898d3f469776c19d99229be055cc2dcea - Patch
References () https://git.kernel.org/stable/c/ad980b04f51f7fb503530bd1cb328ba5e75a250e - () https://git.kernel.org/stable/c/ad980b04f51f7fb503530bd1cb328ba5e75a250e - Patch
References () https://git.kernel.org/stable/c/cc386170b3312fd7b5bc4a69a9f52d7f50814526 - () https://git.kernel.org/stable/c/cc386170b3312fd7b5bc4a69a9f52d7f50814526 - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: caam - Corrige el puntero pasado a caam_qi_shutdown() El tipo del último parámetro dado a devm_add_action_or_reset() es "struct caam_drv_private *", pero en caam_qi_shutdown(), se convierte a "struct device *". Pasa el parámetro correcto a devm_add_action_or_reset() para que los recursos se liberen como se espera.
CWE NVD-CWE-noinfo

29 Dec 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-29 12:15

Updated : 2025-01-06 20:28


NVD link : CVE-2024-56754

Mitre link : CVE-2024-56754

CVE.ORG link : CVE-2024-56754


JSON object : View

Products Affected

linux

  • linux_kernel