CVE-2024-41073

In the Linux kernel, the following vulnerability has been resolved: nvme: avoid double free special payload If a discard request needs to be retried, and that retry may fail before a new special payload is added, a double free will result. Clear the RQF_SPECIAL_LOAD when the request is cleaned.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:32

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1b9fd1265fac85916f90b4648de02adccdb7220b - Patch () https://git.kernel.org/stable/c/1b9fd1265fac85916f90b4648de02adccdb7220b - Patch
References () https://git.kernel.org/stable/c/ae84383c96d6662c24697ab6b44aae855ab670aa - Patch () https://git.kernel.org/stable/c/ae84383c96d6662c24697ab6b44aae855ab670aa - Patch
References () https://git.kernel.org/stable/c/c5942a14f795de957ae9d66027aac8ff4fe70057 - Patch () https://git.kernel.org/stable/c/c5942a14f795de957ae9d66027aac8ff4fe70057 - Patch
References () https://git.kernel.org/stable/c/e5d574ab37f5f2e7937405613d9b1a724811e5ad - Patch () https://git.kernel.org/stable/c/e5d574ab37f5f2e7937405613d9b1a724811e5ad - Patch
References () https://git.kernel.org/stable/c/f3ab45aacd25d957547fb6d115c1574c20964b3b - Patch () https://git.kernel.org/stable/c/f3ab45aacd25d957547fb6d115c1574c20964b3b - Patch

22 Aug 2024, 14:11

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvme: evitar payload de double free especial Si es necesario volver a intentar una solicitud de descarte y ese reintento puede fallar antes de agregar un nuevo payload especial, se producirá un double free. Borre RQF_SPECIAL_LOAD cuando se limpie la solicitud.
CWE CWE-415
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/1b9fd1265fac85916f90b4648de02adccdb7220b - () https://git.kernel.org/stable/c/1b9fd1265fac85916f90b4648de02adccdb7220b - Patch
References () https://git.kernel.org/stable/c/ae84383c96d6662c24697ab6b44aae855ab670aa - () https://git.kernel.org/stable/c/ae84383c96d6662c24697ab6b44aae855ab670aa - Patch
References () https://git.kernel.org/stable/c/c5942a14f795de957ae9d66027aac8ff4fe70057 - () https://git.kernel.org/stable/c/c5942a14f795de957ae9d66027aac8ff4fe70057 - Patch
References () https://git.kernel.org/stable/c/e5d574ab37f5f2e7937405613d9b1a724811e5ad - () https://git.kernel.org/stable/c/e5d574ab37f5f2e7937405613d9b1a724811e5ad - Patch
References () https://git.kernel.org/stable/c/f3ab45aacd25d957547fb6d115c1574c20964b3b - () https://git.kernel.org/stable/c/f3ab45aacd25d957547fb6d115c1574c20964b3b - Patch

29 Jul 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 15:15

Updated : 2024-11-21 09:32


NVD link : CVE-2024-41073

Mitre link : CVE-2024-41073

CVE.ORG link : CVE-2024-41073


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-415

Double Free