In the Linux kernel, the following vulnerability has been resolved:
ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node()
The documentation for device_get_named_child_node() mentions this
important point:
"
The caller is responsible for calling fwnode_handle_put() on the
returned fwnode pointer.
"
Add fwnode_handle_put() to avoid a leaked reference.
References
Configurations
Configuration 1 (hide)
|
History
01 Apr 2025, 18:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/722d33c442e66e4aabd3e778958d696ff3a2777e - Patch | |
References | () https://git.kernel.org/stable/c/7db626d2730d3d80fd31638169054b1e507f07bf - Patch | |
References | () https://git.kernel.org/stable/c/7ef6ecf98ce309b1f4e5a25cddd5965d01feea07 - Patch | |
References | () https://git.kernel.org/stable/c/bd2d9641a39e6b5244230c4b41c4aca83b54b377 - Patch | |
References | () https://git.kernel.org/stable/c/c158cf914713efc3bcdc25680c7156c48c12ef6a - Patch | |
First Time |
Linux
Linux linux Kernel |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* |
21 Nov 2024, 09:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/722d33c442e66e4aabd3e778958d696ff3a2777e - | |
References | () https://git.kernel.org/stable/c/7db626d2730d3d80fd31638169054b1e507f07bf - | |
References | () https://git.kernel.org/stable/c/7ef6ecf98ce309b1f4e5a25cddd5965d01feea07 - | |
References | () https://git.kernel.org/stable/c/bd2d9641a39e6b5244230c4b41c4aca83b54b377 - | |
References | () https://git.kernel.org/stable/c/c158cf914713efc3bcdc25680c7156c48c12ef6a - |
03 Jul 2024, 02:03
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.7 |
CWE | CWE-200 | |
Summary |
|
30 May 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-30 16:15
Updated : 2025-04-01 18:35
NVD link : CVE-2024-36955
Mitre link : CVE-2024-36955
CVE.ORG link : CVE-2024-36955
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor