In the Linux kernel, the following vulnerability has been resolved:
drm: adv7511: Fix use-after-free in adv7533_attach_dsi()
The host_node pointer was assigned and freed in adv7533_parse_dt(), and
later, adv7533_attach_dsi() uses the same. Fix this use-after-free issue
by dropping of_node_put() in adv7533_parse_dt() and calling of_node_put()
in error path of probe() and also in the remove().
References
Configurations
Configuration 1 (hide)
|
History
02 Feb 2025, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Jan 2025, 17:40
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:* |
|
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/1f49aaf55652580ae63ab83d67211fe6a55d83dc - Patch | |
References | () https://git.kernel.org/stable/c/81adbd3ff21c1182e06aa02c6be0bfd9ea02d8e8 - Patch | |
References | () https://git.kernel.org/stable/c/ca9d077350fa21897de8bf64cba23b198740aab5 - Patch | |
References | () https://git.kernel.org/stable/c/d208571943ffddc438a7ce533d5d0b9219806242 - Patch | |
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
17 Jan 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
15 Jan 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-15 13:15
Updated : 2025-02-11 16:15
NVD link : CVE-2024-57887
Mitre link : CVE-2024-57887
CVE.ORG link : CVE-2024-57887
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free