In the Linux kernel, the following vulnerability has been resolved:
crypto: caam - Fix the pointer passed to caam_qi_shutdown()
The type of the last parameter given to devm_add_action_or_reset() is
"struct caam_drv_private *", but in caam_qi_shutdown(), it is casted to
"struct device *".
Pass the correct parameter to devm_add_action_or_reset() so that the
resources are released as expected.
References
Configurations
Configuration 1 (hide)
|
History
06 Jan 2025, 19:39
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux
Linux linux Kernel |
|
References | () https://git.kernel.org/stable/c/1f8e2f597b918ca5827a5c6d00b819d064264d1c - Patch | |
References | () https://git.kernel.org/stable/c/6187727e57aec122c8a99c464c74578c810cbe40 - Patch | |
References | () https://git.kernel.org/stable/c/66eddb8dcb61065c53098510165f14b54232bcc2 - Patch | |
References | () https://git.kernel.org/stable/c/84a185aea7b83f620699de0ea36907d588d89cf6 - Patch | |
References | () https://git.kernel.org/stable/c/ad39df0898d3f469776c19d99229be055cc2dcea - Patch | |
References | () https://git.kernel.org/stable/c/ad980b04f51f7fb503530bd1cb328ba5e75a250e - Patch | |
References | () https://git.kernel.org/stable/c/cc386170b3312fd7b5bc4a69a9f52d7f50814526 - Patch | |
Summary |
|
|
CWE | NVD-CWE-noinfo |
29 Dec 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-29 12:15
Updated : 2025-01-06 20:28
NVD link : CVE-2024-56754
Mitre link : CVE-2024-56754
CVE.ORG link : CVE-2024-56754
JSON object : View
Products Affected
linux
- linux_kernel
CWE