In the Linux kernel, the following vulnerability has been resolved:
EDAC/igen6: Avoid segmentation fault on module unload
The segmentation fault happens because:
During modprobe:
1. In igen6_probe(), igen6_pvt will be allocated with kzalloc()
2. In igen6_register_mci(), mci->pvt_info will point to
&igen6_pvt->imc[mc]
During rmmod:
1. In mci_release() in edac_mc.c, it will kfree(mci->pvt_info)
2. In igen6_remove(), it will kfree(igen6_pvt);
Fix this issue by setting mci->pvt_info to NULL to avoid the double
kfree.
References
Configurations
Configuration 1 (hide)
|
History
08 Jan 2025, 17:11
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CWE | CWE-415 | |
References | () https://git.kernel.org/stable/c/029ac07bb92d2f7502d47a4916f197a8445d83bf - Patch | |
References | () https://git.kernel.org/stable/c/2a80e710bbc088a2511c159ee4d910456c5f0832 - Patch | |
References | () https://git.kernel.org/stable/c/830cabb61113d92a425dd3038ccedbdfb3c8d079 - Patch | |
References | () https://git.kernel.org/stable/c/db60326f2c47b079e36785ace621eb3002db2088 - Patch | |
References | () https://git.kernel.org/stable/c/e5c7052664b61f9e2f896702d20552707d0ef60a - Patch | |
References | () https://git.kernel.org/stable/c/fefaae90398d38a1100ccd73b46ab55ff4610fba - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
Summary |
|
28 Dec 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-28 10:15
Updated : 2025-01-08 17:11
NVD link : CVE-2024-56708
Mitre link : CVE-2024-56708
CVE.ORG link : CVE-2024-56708
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-415
Double Free