2024-07-21 02:03:14 +00:00

29 lines
1.4 KiB
JSON

{
"id": "CVE-2024-40991",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:20.430",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: ti: k3-udma-glue: Fix of_k3_udma_glue_parse_chn_by_id()\n\nThe of_k3_udma_glue_parse_chn_by_id() helper function erroneously\ninvokes \"of_node_put()\" on the \"udmax_np\" device-node passed to it,\nwithout having incremented its reference count at any point. Fix it."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dmaengine: ti: k3-udma-glue: Fix of_k3_udma_glue_parse_chn_by_id() La funci\u00f3n auxiliar of_k3_udma_glue_parse_chn_by_id() invoca err\u00f3neamente \"of_node_put()\" en el nodo de dispositivo \"udmax_np\" que se le pas\u00f3 , sin haber incrementado su recuento de referencias en ning\u00fan momento. Arreglalo."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/a5ab5f413d1e4c7ed5f64271b025f0726374509e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ba27e9d2207784da748b19170a2e56bd7770bd81",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}