THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Zendesk (Helpdesk and Chat)

Ok

PUBLISHED

CVE-2024-27392

nvme: host: fix double-free of struct nvme_id_ns in ns_update_nuse()

Reserved:2024-02-25
Published:2024-05-01
Updated:2024-05-29

Description

In the Linux kernel, the following vulnerability has been resolved: nvme: host: fix double-free of struct nvme_id_ns in ns_update_nuse() When nvme_identify_ns() fails, it frees the pointer to the struct nvme_id_ns before it returns. However, ns_update_nuse() calls kfree() for the pointer even when nvme_identify_ns() fails. This results in KASAN double-free, which was observed with blktests nvme/045 with proposed patches [1] on the kernel v6.8-rc7. Fix the double-free by skipping kfree() when nvme_identify_ns() fails.

Product status

Default status
unaffected

a1a825ab6a60 before 534f9dc7fe49
affected

a1a825ab6a60 before 8d0d2447394b
affected

Default status
affected

6.8
affected

Any version before 6.8
unaffected

6.8.2
unaffected

6.9
unaffected

References

https://git.kernel.org/stable/c/534f9dc7fe495b3f9cc84363898ac50c5a25fccb

https://git.kernel.org/stable/c/8d0d2447394b13fb22a069f0330f9c49b7fff9d3

cve.org CVE-2024-27392

nvd.nist.gov CVE-2024-27392

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-27392