摘要:
In the Linux kernel, the following vulnerability has been resolved:
misc: microchip: pci1xxxx: fix double free in the error handling of gp_aux_bus_probe()
When auxiliary_device_add() returns error and then calls
auxiliary_device_uninit(), callback function
gp_auxiliary_device_release() calls ida_free() and
kfree(aux_device_wrapper) to free memory. We should't
call them again in the error handling path.
Fix this by skipping the redundant cleanup functions.
安全等级: Low
公告ID: KylinSec-SA-2024-3206
发布日期: 2024年7月23日
关联CVE: CVE-2024-36973
In the Linux kernel, the following vulnerability has been resolved:
misc: microchip: pci1xxxx: fix double free in the error handling of gp_aux_bus_probe()
When auxiliary_device_add() returns error and then calls
auxiliary_device_uninit(), callback function
gp_auxiliary_device_release() calls ida_free() and
kfree(aux_device_wrapper) to free memory. We should't
call them again in the error handling path.
Fix this by skipping the redundant cleanup functions.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-36973 | KY3.4-5A | kernel | Unaffected |
CVE-2024-36973 | KY3.5.2 | kernel | Unaffected |