THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-36890

mm/slab: make __free(kfree) accept error pointers

AssignerLinux
Reserved2024-05-30
Published2024-05-30
Updated2024-06-06

Description

In the Linux kernel, the following vulnerability has been resolved: mm/slab: make __free(kfree) accept error pointers Currently, if an automatically freed allocation is an error pointer that will lead to a crash. An example of this is in wm831x_gpio_dbg_show(). 171 char *label __free(kfree) = gpiochip_dup_line_label(chip, i); 172 if (IS_ERR(label)) { 173 dev_err(wm831x->dev, "Failed to duplicate label\n"); 174 continue; 175 } The auto clean up function should check for error pointers as well, otherwise we're going to keep hitting issues like this.

Product status

Default status
unaffected

3c6cc62ce126 before 9f6eb0ab4f95
affected

54da6a092431 before ac6cf3ce9b7d
affected

54da6a092431 before 79cbe0be6c03
affected

54da6a092431 before cd7eb8f83fcf
affected

Default status
affected

6.5
affected

Any version before 6.5
unaffected

6.1.91
unaffected

6.6.31
unaffected

6.8.10
unaffected

6.9
unaffected

References

https://git.kernel.org/stable/c/9f6eb0ab4f95240589ee85fd9886a944cd3645b2

https://git.kernel.org/stable/c/ac6cf3ce9b7d12acb7b528248df5f87caa25fcdc

https://git.kernel.org/stable/c/79cbe0be6c0317b215ddd8bd3e32f0afdac48543

https://git.kernel.org/stable/c/cd7eb8f83fcf258f71e293f7fc52a70be8ed0128

cve.org CVE-2024-36890

nvd.nist.gov CVE-2024-36890

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-36890
© Copyright 2024 THREATINT. Made in Cyprus with +