In the Linux kernel, the following vulnerability has been resolved:
crypto: caam - Fix the pointer passed to caamqishutdown()
The type of the last parameter given to devmaddactionorreset() is "struct caamdrvprivate *", but in caamqishutdown(), it is casted to "struct device *".
Pass the correct parameter to devmaddactionorreset() so that the resources are released as expected.
[
{
"digest": {
"line_hashes": [
"297218761961892878673609842777221201015",
"178959128504265036308100184690238315665",
"288278334852725146525990842587322710779",
"310404889540626578013508651715061874733"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cc386170b3312fd7b5bc4a69a9f52d7f50814526",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "drivers/crypto/caam/qi.c"
},
"id": "CVE-2024-56754-14c6e9b5",
"signature_type": "Line"
},
{
"digest": {
"line_hashes": [
"273963148898135221589629869919383100822",
"178959128504265036308100184690238315665",
"291255114830034549093066284456571215468",
"77195835305251592770603597319048404961"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ad39df0898d3f469776c19d99229be055cc2dcea",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "drivers/crypto/caam/qi.c"
},
"id": "CVE-2024-56754-2d966f0f",
"signature_type": "Line"
},
{
"digest": {
"line_hashes": [
"273963148898135221589629869919383100822",
"178959128504265036308100184690238315665",
"291255114830034549093066284456571215468",
"77195835305251592770603597319048404961"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ad980b04f51f7fb503530bd1cb328ba5e75a250e",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "drivers/crypto/caam/qi.c"
},
"id": "CVE-2024-56754-4b753bfd",
"signature_type": "Line"
},
{
"digest": {
"line_hashes": [
"297218761961892878673609842777221201015",
"178959128504265036308100184690238315665",
"288278334852725146525990842587322710779",
"310404889540626578013508651715061874733"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@66eddb8dcb61065c53098510165f14b54232bcc2",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "drivers/crypto/caam/qi.c"
},
"id": "CVE-2024-56754-557672c0",
"signature_type": "Line"
},
{
"digest": {
"line_hashes": [
"297218761961892878673609842777221201015",
"178959128504265036308100184690238315665",
"288278334852725146525990842587322710779",
"310404889540626578013508651715061874733"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1f8e2f597b918ca5827a5c6d00b819d064264d1c",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "drivers/crypto/caam/qi.c"
},
"id": "CVE-2024-56754-83e37a8a",
"signature_type": "Line"
},
{
"digest": {
"line_hashes": [
"60818747625145564430381389981369961249",
"178959128504265036308100184690238315665",
"291255114830034549093066284456571215468",
"77195835305251592770603597319048404961"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@84a185aea7b83f620699de0ea36907d588d89cf6",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "drivers/crypto/caam/qi.c"
},
"id": "CVE-2024-56754-fd885939",
"signature_type": "Line"
}
]