{"id":"CVE-2024-56681","summary":"crypto: bcm - add error check in the ahash_hmac_init function","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: bcm - add error check in the ahash_hmac_init function\n\nThe ahash_init functions may return fails. The ahash_hmac_init should\nnot return ok when ahash_init returns error. For an example, ahash_init\nwill return -ENOMEM when allocation memory is error.","modified":"2026-04-02T12:25:06.397762Z","published":"2024-12-28T09:46:09.675Z","related":["SUSE-SU-2025:0289-1","SUSE-SU-2025:0428-1","SUSE-SU-2025:0499-1","SUSE-SU-2025:0556-1","SUSE-SU-2025:0557-1","SUSE-SU-2025:0565-1","SUSE-SU-2025:0577-1","SUSE-SU-2025:0577-2","SUSE-SU-2025:20165-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20248-1","SUSE-SU-2025:20249-1","USN-7276-1","USN-7277-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56681.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/05f0a3f5477ecaa1cf46448504afe9e7c2e96fcc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/19630cf57233e845b6ac57c9c969a4888925467b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/28f8ffa945f7d7150463e15097ea73b19529d6f5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4ea3e3b761e371102bb1486778e2f8dbc9e37413"},{"type":"WEB","url":"https://git.kernel.org/stable/c/75e1e38e5d80d6d9011b7322698ffba3dd3db30a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8f1a9a960b1107bd0e0ec3736055f5ed0e717edf"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ae5253313e0ea5f00c06176074592b7f493c8546"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bba9e38c5ad41d0a88b22a59e5b6dd3e31825118"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ee36db8e8203420e6d5c42eb9428920c2fc36532"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56681.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56681"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"9d12ba86f818aa9cfe9f01b750336aa441f2ffa2"},{"fixed":"8f1a9a960b1107bd0e0ec3736055f5ed0e717edf"},{"fixed":"75e1e38e5d80d6d9011b7322698ffba3dd3db30a"},{"fixed":"28f8ffa945f7d7150463e15097ea73b19529d6f5"},{"fixed":"4ea3e3b761e371102bb1486778e2f8dbc9e37413"},{"fixed":"05f0a3f5477ecaa1cf46448504afe9e7c2e96fcc"},{"fixed":"ae5253313e0ea5f00c06176074592b7f493c8546"},{"fixed":"ee36db8e8203420e6d5c42eb9428920c2fc36532"},{"fixed":"bba9e38c5ad41d0a88b22a59e5b6dd3e31825118"},{"fixed":"19630cf57233e845b6ac57c9c969a4888925467b"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-56681.json"}}],"schema_version":"1.7.5"}