First published: Fri May 17 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: crypto: rk3288 - Fix use after free in unprepare The unprepare call must be carried out before the finalize call as the latter can free the request.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.6<6.6.24 | |
Linux Kernel | >=6.7<6.7.12 | |
Linux Kernel | =6.8-rc1 | |
Linux Kernel | =6.8-rc2 | |
Linux Kernel | =6.8-rc3 | |
Linux Kernel | =6.8-rc4 | |
Linux Kernel | =6.8-rc5 | |
Linux Kernel | =6.8-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-35792 has been classified with a critical severity due to the potential for exploitation in the Linux kernel.
To fix CVE-2024-35792, users must update their Linux kernel to a version that patches this vulnerability.
CVE-2024-35792 affects Linux kernel versions between 6.6 and 6.8-rc6.
CVE-2024-35792 is a use after free vulnerability that could lead to serious memory corruption in the Linux kernel.
There are no known workarounds for CVE-2024-35792 other than applying the necessary kernel updates.