In the Linux kernel, the following vulnerability has been resolved:
stm class: Fix a double free in stm_register_device()
The put_device(&stm->dev) call will trigger stm_device_release() which
frees "stm" so the vfree(stm) on the next line is a double free.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/370c480410f60b90ba3e96abe73ead21ec827b20 - Patch | |
References | () https://git.kernel.org/stable/c/3df463865ba42b8f88a590326f4c9ea17a1ce459 - Patch | |
References | () https://git.kernel.org/stable/c/4bfd48bb6e62512b9c392c5002c11e1e3b18d247 - Patch | |
References | () https://git.kernel.org/stable/c/6cc30ef8eb6d8f8d6df43152264bbf8835d99931 - Patch | |
References | () https://git.kernel.org/stable/c/713fc00c571dde4af3db2dbd5d1b0eadc327817b - Patch | |
References | () https://git.kernel.org/stable/c/7419df1acffbcc90037f6b5a2823e81389659b36 - Patch | |
References | () https://git.kernel.org/stable/c/a0450d3f38e7c6c0a7c0afd4182976ee15573695 - Patch | |
References | () https://git.kernel.org/stable/c/d782a2db8f7ac49c33b9ca3e835500a28667d1be - Patch |
09 Sep 2024, 13:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/370c480410f60b90ba3e96abe73ead21ec827b20 - Patch | |
References | () https://git.kernel.org/stable/c/3df463865ba42b8f88a590326f4c9ea17a1ce459 - Patch | |
References | () https://git.kernel.org/stable/c/4bfd48bb6e62512b9c392c5002c11e1e3b18d247 - Patch | |
References | () https://git.kernel.org/stable/c/6cc30ef8eb6d8f8d6df43152264bbf8835d99931 - Patch | |
References | () https://git.kernel.org/stable/c/713fc00c571dde4af3db2dbd5d1b0eadc327817b - Patch | |
References | () https://git.kernel.org/stable/c/7419df1acffbcc90037f6b5a2823e81389659b36 - Patch | |
References | () https://git.kernel.org/stable/c/a0450d3f38e7c6c0a7c0afd4182976ee15573695 - Patch | |
References | () https://git.kernel.org/stable/c/d782a2db8f7ac49c33b9ca3e835500a28667d1be - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
First Time |
Linux linux Kernel
Linux |
|
CWE | CWE-415 |
15 Jul 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Jun 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
21 Jun 2024, 11:22
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-21 11:15
Updated : 2024-11-21 09:26
NVD link : CVE-2024-38627
Mitre link : CVE-2024-38627
CVE.ORG link : CVE-2024-38627
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-415
Double Free