In the Linux kernel, the following vulnerability has been resolved:
PCI: Fix reset_method_store() memory leak
In reset_method_store(), a string is allocated via kstrndup() and assigned
to the local "options". options is then used in with strsep() to find
spaces:
while ((name = strsep(&options, " ")) != NULL) {
If there are no remaining spaces, then options is set to NULL by strsep(),
so the subsequent kfree(options) doesn't free the memory allocated via
kstrndup().
Fix by using a separate tmp_options to iterate with strsep() so options is
preserved.
References
Configurations
Configuration 1 (hide)
|
History
03 Nov 2025, 21:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2024-12-29 12:15
Updated : 2025-11-03 21:18
NVD link : CVE-2024-56745
Mitre link : CVE-2024-56745
CVE.ORG link : CVE-2024-56745
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-401
Missing Release of Memory after Effective Lifetime
