In the Linux kernel, the following vulnerability has been...
High severity
Unreviewed
Published
Feb 28, 2024
to the GitHub Advisory Database
•
Updated Dec 9, 2024
Description
Published by the National Vulnerability Database
Feb 28, 2024
Published to the GitHub Advisory Database
Feb 28, 2024
Last updated
Dec 9, 2024
In the Linux kernel, the following vulnerability has been resolved:
spi: spi-zynqmp-gqspi: fix use-after-free in zynqmp_qspi_exec_op
When handling op->addr, it is using the buffer "tmpbuf" which has been
freed. This will trigger a use-after-free KASAN warning. Let's use
temporary variables to store op->addr.val and op->cmd.opcode to fix
this issue.
References