CVE-2024-36973

In the Linux kernel, the following vulnerability has been resolved: misc: microchip: pci1xxxx: fix double free in the error handling of gp_aux_bus_probe() When auxiliary_device_add() returns error and then calls auxiliary_device_uninit(), callback function gp_auxiliary_device_release() calls ida_free() and kfree(aux_device_wrapper) to free memory. We should't call them again in the error handling path. Fix this by skipping the redundant cleanup functions.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*

History

10 Jan 2025, 18:03

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
CWE CWE-415
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/086c6cbcc563c81d55257f9b27e14faf1d0963d3 - () https://git.kernel.org/stable/c/086c6cbcc563c81d55257f9b27e14faf1d0963d3 - Patch
References () https://git.kernel.org/stable/c/1efe551982297924d05a367aa2b6ec3d275d5742 - () https://git.kernel.org/stable/c/1efe551982297924d05a367aa2b6ec3d275d5742 - Patch
References () https://git.kernel.org/stable/c/34ae447b138680b5ed3660f7d935ff3faf88ba1a - () https://git.kernel.org/stable/c/34ae447b138680b5ed3660f7d935ff3faf88ba1a - Patch
References () https://git.kernel.org/stable/c/86c9713602f786f441630c4ee02891987f8618b9 - () https://git.kernel.org/stable/c/86c9713602f786f441630c4ee02891987f8618b9 - Patch

21 Nov 2024, 09:22

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/086c6cbcc563c81d55257f9b27e14faf1d0963d3 - () https://git.kernel.org/stable/c/086c6cbcc563c81d55257f9b27e14faf1d0963d3 -
References () https://git.kernel.org/stable/c/1efe551982297924d05a367aa2b6ec3d275d5742 - () https://git.kernel.org/stable/c/1efe551982297924d05a367aa2b6ec3d275d5742 -
References () https://git.kernel.org/stable/c/34ae447b138680b5ed3660f7d935ff3faf88ba1a - () https://git.kernel.org/stable/c/34ae447b138680b5ed3660f7d935ff3faf88ba1a -
References () https://git.kernel.org/stable/c/86c9713602f786f441630c4ee02891987f8618b9 - () https://git.kernel.org/stable/c/86c9713602f786f441630c4ee02891987f8618b9 -

21 Jun 2024, 14:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/1efe551982297924d05a367aa2b6ec3d275d5742 -
  • () https://git.kernel.org/stable/c/34ae447b138680b5ed3660f7d935ff3faf88ba1a -
  • () https://git.kernel.org/stable/c/86c9713602f786f441630c4ee02891987f8618b9 -

20 Jun 2024, 12:44

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: misc: microchip: pci1xxxx: corrige double free en el manejo de errores de gp_aux_bus_probe() Cuando auxiliar_device_add() devuelve error y luego llama a auxiliar_device_uninit(), la función de devolución de llamada gp_auxiliary_device_release() llama a ida_free( ) y kfree(aux_device_wrapper) para liberar memoria. No deberíamos volver a llamarlos en la ruta de manejo de errores. Solucione este problema omitiendo las funciones de limpieza redundantes.

17 Jun 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-17 18:15

Updated : 2025-01-10 18:03


NVD link : CVE-2024-36973

Mitre link : CVE-2024-36973

CVE.ORG link : CVE-2024-36973


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-415

Double Free