CVE-2024-56748

In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb() Hook "qed_ops->common->sb_init = qed_sb_init" does not release the DMA memory sb_virt when it fails. Add dma_free_coherent() to free it. This is the same way as qedr_alloc_mem_sb() and qede_alloc_mem_sb().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

06 Jan 2025, 17:07

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: qedf: Se corrige una posible pérdida de memoria en qedf_alloc_and_init_sb() El gancho "qed_ops->common->sb_init = qed_sb_init" no libera la memoria DMA sb_virt cuando falla. Agregue dma_free_coherent() para liberarla. Esta es la misma forma que qedr_alloc_mem_sb() y qede_alloc_mem_sb().
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-401
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/0e04bd5a11dffe8c1c0e4c9fc79f7d3cd6182dd5 - () https://git.kernel.org/stable/c/0e04bd5a11dffe8c1c0e4c9fc79f7d3cd6182dd5 - Patch
References () https://git.kernel.org/stable/c/64654bf5efb3f748e6fc41227adda689618ce9c4 - () https://git.kernel.org/stable/c/64654bf5efb3f748e6fc41227adda689618ce9c4 - Patch
References () https://git.kernel.org/stable/c/78a169dc69fbdaf114c40e2d56955bf6bd4fc3c0 - () https://git.kernel.org/stable/c/78a169dc69fbdaf114c40e2d56955bf6bd4fc3c0 - Patch
References () https://git.kernel.org/stable/c/7c1832287b21ff68c4e3625e63cc7619edf5908b - () https://git.kernel.org/stable/c/7c1832287b21ff68c4e3625e63cc7619edf5908b - Patch
References () https://git.kernel.org/stable/c/97384449ddfc07f12ca75f510eb070020d7abb34 - () https://git.kernel.org/stable/c/97384449ddfc07f12ca75f510eb070020d7abb34 - Patch
References () https://git.kernel.org/stable/c/a56777a3ef5b35e24a20c4418bcf88bad033807a - () https://git.kernel.org/stable/c/a56777a3ef5b35e24a20c4418bcf88bad033807a - Patch
References () https://git.kernel.org/stable/c/b514f45e0fe18d763a1afc34401b1585333cb329 - () https://git.kernel.org/stable/c/b514f45e0fe18d763a1afc34401b1585333cb329 - Patch
References () https://git.kernel.org/stable/c/c62c30429db3eb4ced35c7fcf6f04a61ce3a01bb - () https://git.kernel.org/stable/c/c62c30429db3eb4ced35c7fcf6f04a61ce3a01bb - Patch

29 Dec 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-29 12:15

Updated : 2025-04-17 21:15


NVD link : CVE-2024-56748

Mitre link : CVE-2024-56748

CVE.ORG link : CVE-2024-56748


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime