In the Linux kernel, the following vulnerability has been resolved:
crypto: rk3288 - Fix use after free in unprepare
The unprepare call must be carried out before the finalize call
as the latter can free the request.
References
| Link | Resource |
|---|---|
| https://git.kernel.org/stable/c/48dd260fdb728eda4a246f635d1325e82f0d3555 | Mailing List Patch |
| https://git.kernel.org/stable/c/c0afb6b88fbbc177fa322a835f874be217bffe45 | Mailing List Patch |
| https://git.kernel.org/stable/c/eb2a41a8ae8c8c4f68aef3bd94665c0cf23e04be | Mailing List Patch |
| https://git.kernel.org/stable/c/48dd260fdb728eda4a246f635d1325e82f0d3555 | Mailing List Patch |
| https://git.kernel.org/stable/c/c0afb6b88fbbc177fa322a835f874be217bffe45 | Mailing List Patch |
| https://git.kernel.org/stable/c/eb2a41a8ae8c8c4f68aef3bd94665c0cf23e04be | Mailing List Patch |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-05-17 13:15
Updated : 2025-03-05 17:39
NVD link : CVE-2024-35792
Mitre link : CVE-2024-35792
CVE.ORG link : CVE-2024-35792
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
