28 lines
1.3 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-26652",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-27T14:15:10.297",
"lastModified": "2024-03-27T15:49:41.437",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: pds_core: Fix possible double free in error handling path\n\nWhen auxiliary_device_add() returns error and then calls\nauxiliary_device_uninit(), Callback function pdsc_auxbus_dev_release\ncalls kfree(padev) to free memory. We shouldn't call kfree(padev)\nagain in the error handling path.\n\nFix this by cleaning up the redundant kfree() and putting\nthe error handling back to where the errors happened."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/995f802abff209514ac2ee03b96224237646cec3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ba18deddd6d502da71fd6b6143c53042271b82bd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ffda0e962f270b3ec937660afd15b685263232d3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}