In the Linux kernel, the following vulnerability has been resolved:
crypto: caam - Fix the pointer passed to caam_qi_shutdown()
The type of the last parameter given to devm_add_action_or_reset() is
"struct caam_drv_private *", but in caam_qi_shutdown(), it is casted to
"struct device *".
Pass the correct parameter to devm_add_action_or_reset() so that the
resources are released as expected.
Metrics
Affected Vendors & Products
References
History
Thu, 09 Jan 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Mon, 06 Jan 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Vendors & Products |
Linux
Linux linux Kernel |
|
Metrics |
cvssV3_1
|
Sun, 29 Dec 2024 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: crypto: caam - Fix the pointer passed to caam_qi_shutdown() The type of the last parameter given to devm_add_action_or_reset() is "struct caam_drv_private *", but in caam_qi_shutdown(), it is casted to "struct device *". Pass the correct parameter to devm_add_action_or_reset() so that the resources are released as expected. | |
Title | crypto: caam - Fix the pointer passed to caam_qi_shutdown() | |
References |
|
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-12-29T11:30:19.049Z
Updated: 2024-12-29T11:30:19.049Z
Reserved: 2024-12-29T11:26:39.760Z
Link: CVE-2024-56754
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2024-12-29T12:15:08.967
Modified: 2025-01-06T20:28:24.853
Link: CVE-2024-56754
Redhat