Executive Summary



This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary
Informations
Name CVE-2024-56562 First vendor Publication 2024-12-27
Vendor Cve Last vendor Modification 2024-12-27

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs()

if (dev->boardinfo && dev->boardinfo->init_dyn_addr)
^^^ here check "init_dyn_addr"
i3c_bus_set_addr_slot_status(&master->bus, dev->info.dyn_addr, ...)
^^^^
free "dyn_addr" Fix copy/paste error "dyn_addr" by replacing it with "init_dyn_addr".

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56562

Sources (Detail)

https://git.kernel.org/stable/c/093ecc6d82ff1d2e0cbf6f2000438b6c698145cb
https://git.kernel.org/stable/c/0cb21f1ea3a2e19ee314a8fcf95461b5c453c59e
https://git.kernel.org/stable/c/0e8ab955c6d06f9d907761c07c02d1492f0a8ac1
https://git.kernel.org/stable/c/3082990592f7c6d7510a9133afa46e31bbe26533
https://git.kernel.org/stable/c/991e33a99fd3b5d432f0629565f532f563fe019a
https://git.kernel.org/stable/c/c2f0ce241154b04f2fc150ff16ad82d9b8fdfa4a
https://git.kernel.org/stable/c/ce30d11b39e8d637fed4704a5b43e9d556990475
Source Url

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2024-12-27 21:20:29
  • First insertion