In the Linux kernel, the following vulnerability has been resolved:
PCI: Fix reset_method_store() memory leak
In reset_method_store(), a string is allocated via kstrndup() and assigned
to the local "options". options is then used in with strsep() to find
spaces:
while ((name = strsep(&options, " ")) != NULL) {
If there are no remaining spaces, then options is set to NULL by strsep(),
so the subsequent kfree(options) doesn't free the memory allocated via
kstrndup().
Fix by using a separate tmp_options to iterate with strsep() so options is
preserved.
References
Configurations
Configuration 1 (hide)
|
History
07 Jan 2025, 22:47
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CWE | CWE-401 | |
First Time |
Linux
Linux linux Kernel |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
References | () https://git.kernel.org/stable/c/2985b1844f3f3447f2d938eff1ef6762592065a5 - Patch | |
References | () https://git.kernel.org/stable/c/403efb4457c0c8f8f51e904cc57d39193780c6bd - Patch | |
References | () https://git.kernel.org/stable/c/543d0eb40e45c6a51f1bff02f417b602e54472d5 - Patch | |
References | () https://git.kernel.org/stable/c/8e098baf6bc3f3a6aefc383509aba07e202f7ee0 - Patch | |
References | () https://git.kernel.org/stable/c/931d07ccffcc3614f20aaf602b31e89754e21c59 - Patch | |
References | () https://git.kernel.org/stable/c/fe6fae61f3b993160aef5fe2b7141a83872c144f - Patch |
29 Dec 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-29 12:15
Updated : 2025-01-07 22:47
NVD link : CVE-2024-56745
Mitre link : CVE-2024-56745
CVE.ORG link : CVE-2024-56745
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-401
Missing Release of Memory after Effective Lifetime