CVE-2024-56632

Source
https://cve.org/CVERecord?id=CVE-2024-56632
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56632.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-56632
Downstream
Related
Published
2024-12-27T15:02:30.396Z
Modified
2026-03-11T07:53:02.361735425Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
nvme-tcp: fix the memleak while create new ctrl failed
Details

In the Linux kernel, the following vulnerability has been resolved:

nvme-tcp: fix the memleak while create new ctrl failed

Now while we create new ctrl failed, we have not free the tagset occupied by admin_q, here try to fix it.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56632.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
fd1418de10b9ca03d78404cf00a95138689ea369
Fixed
ceff9ac13a2478afddce85414d404e6aff6425f6
Fixed
fec55c29e54d3ca6fe9d7d7d9266098b4514fd34

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56632.json"