CVE-2024-56573

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-56573
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56573.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-56573
Downstream
Related
Published
2024-12-27T14:23:16.231Z
Modified
2025-11-27T02:32:29.317804Z
Summary
efi/libstub: Free correct pointer on failure
Details

In the Linux kernel, the following vulnerability has been resolved:

efi/libstub: Free correct pointer on failure

cmdline_ptr is an out parameter, which is not allocated by the function itself, and likely points into the caller's stack.

cmdline refers to the pool allocation that should be freed when cleaning up after a failure, so pass this instead to free_pool().

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/blob/cc431b3424123d84bcd7afd4de150b33f117a8ef/cves/2024/56xxx/CVE-2024-56573.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
42c8ea3dca094ab82776ca706fb7a9cbe8ac3dc9
Fixed
d173aee5709bd0994d216d60589ec67f8b11376a
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
42c8ea3dca094ab82776ca706fb7a9cbe8ac3dc9
Fixed
eaafbcf0a5782ae412ca7de12ef83fc48ccea4cf
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
42c8ea3dca094ab82776ca706fb7a9cbe8ac3dc9
Fixed
06d39d79cbd5a91a33707951ebf2512d0e759847

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.64
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.4