CVE-2024-38617

In the Linux kernel, the following vulnerability has been resolved: kunit/fortify: Fix mismatched kvalloc()/vfree() usage The kv*() family of tests were accidentally freeing with vfree() instead of kvfree(). Use kvfree() instead.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

03 Oct 2025, 15:54

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
CWE CWE-763
References () https://git.kernel.org/stable/c/03758d5a0932016b6d5f5bfbca580177e6bc937a - () https://git.kernel.org/stable/c/03758d5a0932016b6d5f5bfbca580177e6bc937a - Patch
References () https://git.kernel.org/stable/c/42d21c9727028fe7ee392223ba127484b1b8677e - () https://git.kernel.org/stable/c/42d21c9727028fe7ee392223ba127484b1b8677e - Patch
References () https://git.kernel.org/stable/c/7880dbf4eafe22a6a41a42e774f1122c814ed02d - () https://git.kernel.org/stable/c/7880dbf4eafe22a6a41a42e774f1122c814ed02d - Patch
References () https://git.kernel.org/stable/c/998b18072ceb0613629c256b409f4d299829c7ec - () https://git.kernel.org/stable/c/998b18072ceb0613629c256b409f4d299829c7ec - Patch

Information

Published : 2024-06-19 14:15

Updated : 2025-10-03 15:54


NVD link : CVE-2024-38617

Mitre link : CVE-2024-38617

CVE.ORG link : CVE-2024-38617


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-763

Release of Invalid Pointer or Reference