摘要:
In the Linux kernel, the following vulnerability has been resolved:
mtd: rawnand: fix double free in atmel_pmecc_create_user()
The "user" pointer was converted from being allocated with kzalloc() to
being allocated by devm_kzalloc(). Calling kfree(user) will lead to a
double free.
安全等级: Low
公告ID: KylinSec-SA-2025-1073
发布日期: 2025年1月27日
关联CVE: CVE-2024-56766
In the Linux kernel, the following vulnerability has been resolved:
mtd: rawnand: fix double free in atmel_pmecc_create_user()
The "user" pointer was converted from being allocated with kzalloc() to
being allocated by devm_kzalloc(). Calling kfree(user) will lead to a
double free.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-56766 | KY3.4-5 | kernel | Unaffected |
CVE-2024-56766 | V6 | kernel | Unaffected |