CVE-2024-26930

In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix double free of the ha->vp_map pointer Coverity scan reported potential risk of double free of the pointer ha->vp_map. ha->vp_map was freed in qla2x00_mem_alloc(), and again freed in function qla2x00_mem_free(ha). Assign NULL to vp_map and kfree take care of NULL.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*

History

21 Nov 2024, 09:03

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/825d63164a2e6bacb059a9afb5605425b485413f - Patch () https://git.kernel.org/stable/c/825d63164a2e6bacb059a9afb5605425b485413f - Patch
References () https://git.kernel.org/stable/c/b7deb675d674f44e0ddbab87fee8f9f098925e73 - Patch () https://git.kernel.org/stable/c/b7deb675d674f44e0ddbab87fee8f9f098925e73 - Patch
References () https://git.kernel.org/stable/c/e288285d47784fdcf7c81be56df7d65c6f10c58b - Patch () https://git.kernel.org/stable/c/e288285d47784fdcf7c81be56df7d65c6f10c58b - Patch
References () https://git.kernel.org/stable/c/f14cee7a882cb79528f17a2335f53e9fd1848467 - Patch () https://git.kernel.org/stable/c/f14cee7a882cb79528f17a2335f53e9fd1848467 - Patch

23 May 2024, 19:10

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: qla2xxx: Corrección de doble liberación del puntero ha->vp_map Coverity scan informó un riesgo potencial de doble liberación del puntero ha->vp_map. ha->vp_map se liberó en qla2x00_mem_alloc() y nuevamente se liberó en la función qla2x00_mem_free(ha). Asigne NULL a vp_map y kfree se encargará de NULL.
CPE cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-415
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/825d63164a2e6bacb059a9afb5605425b485413f - () https://git.kernel.org/stable/c/825d63164a2e6bacb059a9afb5605425b485413f - Patch
References () https://git.kernel.org/stable/c/b7deb675d674f44e0ddbab87fee8f9f098925e73 - () https://git.kernel.org/stable/c/b7deb675d674f44e0ddbab87fee8f9f098925e73 - Patch
References () https://git.kernel.org/stable/c/e288285d47784fdcf7c81be56df7d65c6f10c58b - () https://git.kernel.org/stable/c/e288285d47784fdcf7c81be56df7d65c6f10c58b - Patch
References () https://git.kernel.org/stable/c/f14cee7a882cb79528f17a2335f53e9fd1848467 - () https://git.kernel.org/stable/c/f14cee7a882cb79528f17a2335f53e9fd1848467 - Patch

01 May 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-01 06:15

Updated : 2024-11-21 09:03


NVD link : CVE-2024-26930

Mitre link : CVE-2024-26930

CVE.ORG link : CVE-2024-26930


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-415

Double Free