CVE-2024-35792Use After Free in Linux

CWE-416Use After Free7 documents7 sources
Severity
7.8HIGHNVD
EPSS
0.1%
top 72.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 17

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: rk3288 - Fix use after free in unprepare The unprepare call must be carried out before the finalize call as the latter can free the request.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages8 packages

NVDlinux/linux_kernel6.66.6.24+2
Debianlinux/linux_kernel< 6.7.12-1+1
CVEListV5linux/linuxc66c17a0f69b0e017bbc01d999a28ed96ee8482648dd260fdb728eda4a246f635d1325e82f0d3555+3
debiandebian/linux< linux 6.7.12-1 (forky)

Patches

🔴Vulnerability Details

2
OSV
CVE-2024-35792: In the Linux kernel, the following vulnerability has been resolved: crypto: rk3288 - Fix use after free in unprepare The unprepare call must be carrie2024-05-17
GHSA
GHSA-gf77-wgv9-4v74: In the Linux kernel, the following vulnerability has been resolved: crypto: rk3288 - Fix use after free in unprepare The unprepare call must be carr2024-05-17

📋Vendor Advisories

3
Red Hat
kernel: crypto: rk3288 - Fix use after free in unprepare2024-05-17
Microsoft
crypto: rk3288 - Fix use after free in unprepare2024-05-14
Debian
CVE-2024-35792: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: rk3...2024

💬Community

1
Bugzilla
CVE-2024-35792 kernel: crypto: rk3288 - Fix use after free in unprepare2024-05-17