Executive Summary



This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary
Informations
Name CVE-2024-56681 First vendor Publication 2024-12-28
Vendor Cve Last vendor Modification 2024-12-28

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

crypto: bcm - add error check in the ahash_hmac_init function

The ahash_init functions may return fails. The ahash_hmac_init should not return ok when ahash_init returns error. For an example, ahash_init will return -ENOMEM when allocation memory is error.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56681

Sources (Detail)

https://git.kernel.org/stable/c/05f0a3f5477ecaa1cf46448504afe9e7c2e96fcc
https://git.kernel.org/stable/c/19630cf57233e845b6ac57c9c969a4888925467b
https://git.kernel.org/stable/c/28f8ffa945f7d7150463e15097ea73b19529d6f5
https://git.kernel.org/stable/c/4ea3e3b761e371102bb1486778e2f8dbc9e37413
https://git.kernel.org/stable/c/75e1e38e5d80d6d9011b7322698ffba3dd3db30a
https://git.kernel.org/stable/c/8f1a9a960b1107bd0e0ec3736055f5ed0e717edf
https://git.kernel.org/stable/c/ae5253313e0ea5f00c06176074592b7f493c8546
https://git.kernel.org/stable/c/bba9e38c5ad41d0a88b22a59e5b6dd3e31825118
https://git.kernel.org/stable/c/ee36db8e8203420e6d5c42eb9428920c2fc36532
Source Url

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2024-12-28 13:20:29
  • First insertion