CVE-2024-56748
Published: January 1, 2025Last modified: January 1, 2025
Description
In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb() Hook "qed_ops->common->sb_init = qed_sb_init" does not release the DMA memory sb_virt when it fails. Add dma_free_coherent() to free it. This is the same way as qedr_alloc_mem_sb() and qede_alloc_mem_sb().
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 |
Attack Vector | LOCAL |
Attack complexity | LOW |
Privileges required | LOW |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | NONE |
Integrity impact | NONE |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.120-r0) |
Stream | linux-lts | Fixed (6.6.64-r0) |
References
- https://git.kernel.org/stable/c/0e04bd5a11dffe8c1c0e4c9fc79f7d3cd6182dd5
- https://git.kernel.org/stable/c/64654bf5efb3f748e6fc41227adda689618ce9c4
- https://git.kernel.org/stable/c/78a169dc69fbdaf114c40e2d56955bf6bd4fc3c0
- https://git.kernel.org/stable/c/7c1832287b21ff68c4e3625e63cc7619edf5908b
- https://git.kernel.org/stable/c/97384449ddfc07f12ca75f510eb070020d7abb34
- https://git.kernel.org/stable/c/a56777a3ef5b35e24a20c4418bcf88bad033807a
- https://git.kernel.org/stable/c/b514f45e0fe18d763a1afc34401b1585333cb329
- https://git.kernel.org/stable/c/c62c30429db3eb4ced35c7fcf6f04a61ce3a01bb