CVE-2024-56708

In the Linux kernel, the following vulnerability has been resolved: EDAC/igen6: Avoid segmentation fault on module unload The segmentation fault happens because: During modprobe: 1. In igen6_probe(), igen6_pvt will be allocated with kzalloc() 2. In igen6_register_mci(), mci->pvt_info will point to &igen6_pvt->imc[mc] During rmmod: 1. In mci_release() in edac_mc.c, it will kfree(mci->pvt_info) 2. In igen6_remove(), it will kfree(igen6_pvt); Fix this issue by setting mci->pvt_info to NULL to avoid the double kfree.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

08 Jan 2025, 17:11

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-415
References () https://git.kernel.org/stable/c/029ac07bb92d2f7502d47a4916f197a8445d83bf - () https://git.kernel.org/stable/c/029ac07bb92d2f7502d47a4916f197a8445d83bf - Patch
References () https://git.kernel.org/stable/c/2a80e710bbc088a2511c159ee4d910456c5f0832 - () https://git.kernel.org/stable/c/2a80e710bbc088a2511c159ee4d910456c5f0832 - Patch
References () https://git.kernel.org/stable/c/830cabb61113d92a425dd3038ccedbdfb3c8d079 - () https://git.kernel.org/stable/c/830cabb61113d92a425dd3038ccedbdfb3c8d079 - Patch
References () https://git.kernel.org/stable/c/db60326f2c47b079e36785ace621eb3002db2088 - () https://git.kernel.org/stable/c/db60326f2c47b079e36785ace621eb3002db2088 - Patch
References () https://git.kernel.org/stable/c/e5c7052664b61f9e2f896702d20552707d0ef60a - () https://git.kernel.org/stable/c/e5c7052664b61f9e2f896702d20552707d0ef60a - Patch
References () https://git.kernel.org/stable/c/fefaae90398d38a1100ccd73b46ab55ff4610fba - () https://git.kernel.org/stable/c/fefaae90398d38a1100ccd73b46ab55ff4610fba - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: EDAC/igen6: Evitar fallo de segmentación al descargar el módulo El fallo de segmentación ocurre porque: Durante modprobe: 1. En igen6_probe(), igen6_pvt se asignará con kzalloc() 2. En igen6_register_mci(), mci->pvt_info apuntará a &igen6_pvt->imc[mc] Durante rmmod: 1. En mci_release() en edac_mc.c, kfree(mci->pvt_info) 2. En igen6_remove(), kfree(igen6_pvt); Solucione este problema configurando mci->pvt_info en NULL para evitar el kfree doble.

28 Dec 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-28 10:15

Updated : 2025-01-08 17:11


NVD link : CVE-2024-56708

Mitre link : CVE-2024-56708

CVE.ORG link : CVE-2024-56708


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-415

Double Free