{ "id": "CVE-2024-56573", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:16.320", "lastModified": "2024-12-27T15:15:16.320", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nefi/libstub: Free correct pointer on failure\n\ncmdline_ptr is an out parameter, which is not allocated by the function\nitself, and likely points into the caller's stack.\n\ncmdline refers to the pool allocation that should be freed when cleaning\nup after a failure, so pass this instead to free_pool()." }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: efi/libstub: Liberar puntero correcto en caso de falla cmdline_ptr es un par\u00e1metro de salida, que no es asignado por la funci\u00f3n en s\u00ed, y probablemente apunta a la pila del llamador. cmdline se refiere a la asignaci\u00f3n del grupo que se debe liberar al limpiar despu\u00e9s de una falla, as\u00ed que p\u00e1selo en su lugar a free_pool()." } ], "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/06d39d79cbd5a91a33707951ebf2512d0e759847", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/d173aee5709bd0994d216d60589ec67f8b11376a", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/eaafbcf0a5782ae412ca7de12ef83fc48ccea4cf", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] }