In the Linux kernel, the following vulnerability has been resolved:
nvme: avoid double free special payload
If a discard request needs to be retried, and that retry may fail before
a new special payload is added, a double free will result. Clear the
RQF_SPECIAL_LOAD when the request is cleaned.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/1b9fd1265fac85916f90b4648de02adccdb7220b - Patch | |
References | () https://git.kernel.org/stable/c/ae84383c96d6662c24697ab6b44aae855ab670aa - Patch | |
References | () https://git.kernel.org/stable/c/c5942a14f795de957ae9d66027aac8ff4fe70057 - Patch | |
References | () https://git.kernel.org/stable/c/e5d574ab37f5f2e7937405613d9b1a724811e5ad - Patch | |
References | () https://git.kernel.org/stable/c/f3ab45aacd25d957547fb6d115c1574c20964b3b - Patch |
22 Aug 2024, 14:11
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CWE | CWE-415 | |
First Time |
Linux
Linux linux Kernel |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/1b9fd1265fac85916f90b4648de02adccdb7220b - Patch | |
References | () https://git.kernel.org/stable/c/ae84383c96d6662c24697ab6b44aae855ab670aa - Patch | |
References | () https://git.kernel.org/stable/c/c5942a14f795de957ae9d66027aac8ff4fe70057 - Patch | |
References | () https://git.kernel.org/stable/c/e5d574ab37f5f2e7937405613d9b1a724811e5ad - Patch | |
References | () https://git.kernel.org/stable/c/f3ab45aacd25d957547fb6d115c1574c20964b3b - Patch |
29 Jul 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-29 15:15
Updated : 2024-11-21 09:32
NVD link : CVE-2024-41073
Mitre link : CVE-2024-41073
CVE.ORG link : CVE-2024-41073
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-415
Double Free