๐Ÿ” CVE Alert

CVE-2024-56745

LOW 3.3

PCI: Fix reset_method_store() memory leak

CVSS Score
3.3
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: PCI: Fix reset_method_store() memory leak In reset_method_store(), a string is allocated via kstrndup() and assigned to the local "options". options is then used in with strsep() to find spaces: while ((name = strsep(&options, " ")) != NULL) { If there are no remaining spaces, then options is set to NULL by strsep(), so the subsequent kfree(options) doesn't free the memory allocated via kstrndup(). Fix by using a separate tmp_options to iterate with strsep() so options is preserved.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 29, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new low vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
d88f521da3efd698e36d0d504a2abba6ac4f5ef8 < 403efb4457c0c8f8f51e904cc57d39193780c6bd d88f521da3efd698e36d0d504a2abba6ac4f5ef8 < 931d07ccffcc3614f20aaf602b31e89754e21c59 d88f521da3efd698e36d0d504a2abba6ac4f5ef8 < 8e098baf6bc3f3a6aefc383509aba07e202f7ee0 d88f521da3efd698e36d0d504a2abba6ac4f5ef8 < 543d0eb40e45c6a51f1bff02f417b602e54472d5 d88f521da3efd698e36d0d504a2abba6ac4f5ef8 < fe6fae61f3b993160aef5fe2b7141a83872c144f d88f521da3efd698e36d0d504a2abba6ac4f5ef8 < 2985b1844f3f3447f2d938eff1ef6762592065a5
Linux / Linux
5.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/403efb4457c0c8f8f51e904cc57d39193780c6bd git.kernel.org: https://git.kernel.org/stable/c/931d07ccffcc3614f20aaf602b31e89754e21c59 git.kernel.org: https://git.kernel.org/stable/c/8e098baf6bc3f3a6aefc383509aba07e202f7ee0 git.kernel.org: https://git.kernel.org/stable/c/543d0eb40e45c6a51f1bff02f417b602e54472d5 git.kernel.org: https://git.kernel.org/stable/c/fe6fae61f3b993160aef5fe2b7141a83872c144f git.kernel.org: https://git.kernel.org/stable/c/2985b1844f3f3447f2d938eff1ef6762592065a5 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html