We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-26653

usb: misc: ljca: Fix double free in error handling path



Description

In the Linux kernel, the following vulnerability has been resolved: usb: misc: ljca: Fix double free in error handling path When auxiliary_device_add() returns error and then calls auxiliary_device_uninit(), callback function ljca_auxdev_release calls kfree(auxdev->dev.platform_data) to free the parameter data of the function ljca_new_client_device. The callers of ljca_new_client_device shouldn't call kfree() again in the error handling path to free the platform data. Fix this by cleaning up the redundant kfree() in all callers and adding kfree() the passed in platform_data on errors which happen before auxiliary_device_init() succeeds .

Reserved 2024-02-19 | Published 2024-04-01 | Updated 2024-12-19 | Assigner Linux

Product status

Default status
unaffected

acd6199f195d6de814ac4090ce0864a613b1580e before 420babea4f1881a7c4ea22a8e218b8c6895d3f21
affected

acd6199f195d6de814ac4090ce0864a613b1580e before 8a9f653cc852677003c23ee8075e3ed8fb4743c9
affected

acd6199f195d6de814ac4090ce0864a613b1580e before 7c9631969287a5366bc8e39cd5abff154b35fb80
affected

Default status
affected

6.7
affected

Any version before 6.7
unaffected

6.7.12
unaffected

6.8.3
unaffected

6.9
unaffected

References

git.kernel.org/...c/420babea4f1881a7c4ea22a8e218b8c6895d3f21

git.kernel.org/...c/8a9f653cc852677003c23ee8075e3ed8fb4743c9

git.kernel.org/...c/7c9631969287a5366bc8e39cd5abff154b35fb80

cve.org (CVE-2024-26653)

nvd.nist.gov (CVE-2024-26653)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-26653

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.