In the Linux kernel, the following vulnerability has been resolved:
crypto: rk3288 - Fix use after free in unprepare
The unprepare call must be carried out before the finalize call
as the latter can free the request.
References
Link | Resource |
---|---|
https://git.kernel.org/stable/c/48dd260fdb728eda4a246f635d1325e82f0d3555 | Patch Mailing List |
https://git.kernel.org/stable/c/48dd260fdb728eda4a246f635d1325e82f0d3555 | Patch Mailing List |
https://git.kernel.org/stable/c/c0afb6b88fbbc177fa322a835f874be217bffe45 | Patch Mailing List |
https://git.kernel.org/stable/c/c0afb6b88fbbc177fa322a835f874be217bffe45 | Patch Mailing List |
https://git.kernel.org/stable/c/eb2a41a8ae8c8c4f68aef3bd94665c0cf23e04be | Patch Mailing List |
https://git.kernel.org/stable/c/eb2a41a8ae8c8c4f68aef3bd94665c0cf23e04be | Patch Mailing List |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:20
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/c0afb6b88fbbc177fa322a835f874be217bffe45 - Patch, Mailing List | |
References | () https://git.kernel.org/stable/c/eb2a41a8ae8c8c4f68aef3bd94665c0cf23e04be - Patch, Mailing List | |
References | () https://git.kernel.org/stable/c/48dd260fdb728eda4a246f635d1325e82f0d3555 - Patch, Mailing List |
17 May 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-17 13:15
Updated : 2024-11-21 09:20
NVD link : CVE-2024-35792
Mitre link : CVE-2024-35792
JSON object : View
Products Affected
linux
- linux_kernel
CWE
No CWE.