{"id":"CVE-2024-56562","summary":"i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ni3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs()\n\nif (dev-\u003eboardinfo && dev-\u003eboardinfo-\u003einit_dyn_addr)\n                                      ^^^ here check \"init_dyn_addr\"\n\ti3c_bus_set_addr_slot_status(&master-\u003ebus, dev-\u003einfo.dyn_addr, ...)\n\t\t\t\t\t\t             ^^^^\n\t\t\t\t\t\t\tfree \"dyn_addr\"\nFix copy/paste error \"dyn_addr\" by replacing it with \"init_dyn_addr\".","modified":"2026-03-20T12:39:50.920682Z","published":"2024-12-27T14:23:07.130Z","related":["SUSE-SU-2025:0117-1","SUSE-SU-2025:0153-1","SUSE-SU-2025:0154-1","SUSE-SU-2025:0289-1","SUSE-SU-2025:0556-1","SUSE-SU-2025:0577-1","SUSE-SU-2025:0577-2","SUSE-SU-2025:20165-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20248-1","SUSE-SU-2025:20249-1","USN-7379-2","USN-7380-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56562.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/093ecc6d82ff1d2e0cbf6f2000438b6c698145cb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/0cb21f1ea3a2e19ee314a8fcf95461b5c453c59e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/0e8ab955c6d06f9d907761c07c02d1492f0a8ac1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3082990592f7c6d7510a9133afa46e31bbe26533"},{"type":"WEB","url":"https://git.kernel.org/stable/c/991e33a99fd3b5d432f0629565f532f563fe019a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c2f0ce241154b04f2fc150ff16ad82d9b8fdfa4a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ce30d11b39e8d637fed4704a5b43e9d556990475"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56562.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56562"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3a379bbcea0af6280e1ca0d1edfcf4e68cde6ee0"},{"fixed":"c2f0ce241154b04f2fc150ff16ad82d9b8fdfa4a"},{"fixed":"093ecc6d82ff1d2e0cbf6f2000438b6c698145cb"},{"fixed":"0cb21f1ea3a2e19ee314a8fcf95461b5c453c59e"},{"fixed":"991e33a99fd3b5d432f0629565f532f563fe019a"},{"fixed":"ce30d11b39e8d637fed4704a5b43e9d556990475"},{"fixed":"0e8ab955c6d06f9d907761c07c02d1492f0a8ac1"},{"fixed":"3082990592f7c6d7510a9133afa46e31bbe26533"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56562.json"}}],"schema_version":"1.7.5"}