First published: Mon Apr 01 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: usb: misc: ljca: Fix double free in error handling path When auxiliary_device_add() returns error and then calls auxiliary_device_uninit(), callback function ljca_auxdev_release calls kfree(auxdev->dev.platform_data) to free the parameter data of the function ljca_new_client_device. The callers of ljca_new_client_device shouldn't call kfree() again in the error handling path to free the platform data. Fix this by cleaning up the redundant kfree() in all callers and adding kfree() the passed in platform_data on errors which happen before auxiliary_device_init() succeeds .
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.7<6.7.12 | |
Linux Kernel | >=6.8<6.8.3 | |
Linux Kernel | =6.9-rc1 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26653 is classified as a medium severity vulnerability in the Linux kernel.
To fix CVE-2024-26653, update to the latest Linux kernel versions provided by your distribution, particularly versions greater than or equal to 6.8.4.
CVE-2024-26653 affects Linux kernel versions from 6.7 up to 6.8.3 and includes 6.9-rc1.
CVE-2024-26653 involves a double free vulnerability in the USB miscellaneous driver error handling path.
There are no official workarounds available for CVE-2024-26653; the best course of action is to apply the available patches.