First published: Fri Sep 13 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: scsi: aacraid: Fix double-free on probe failure aac_probe_one() calls hardware-specific init functions through the aac_driver_ident::init pointer, all of which eventually call down to aac_init_adapter(). If aac_init_adapter() fails after allocating memory for aac_dev::queues, it frees the memory but does not clear that member. After the hardware-specific init function returns an error, aac_probe_one() goes down an error path that frees the memory pointed to by aac_dev::queues, resulting.in a double-free.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=2.6.15<4.19.321 | |
Linux Kernel | >=4.20<5.4.283 | |
Linux Kernel | >=5.5<5.10.225 | |
Linux Kernel | >=5.11<5.15.166 | |
Linux Kernel | >=5.16<6.1.108 | |
Linux Kernel | >=6.2<6.6.49 | |
Linux Kernel | >=6.7<6.10.8 | |
Linux Kernel | =6.11-rc1 | |
Linux Kernel | =6.11-rc2 | |
Linux Kernel | =6.11-rc3 | |
Linux Kernel | =6.11-rc4 | |
Linux Kernel | =6.11-rc5 | |
debian/linux | <=5.10.223-1 | 5.10.234-1 6.1.129-1 6.1.128-1 6.12.21-1 |
debian/linux-6.1 | 6.1.129-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-46673 has a severity rating that indicates a potential impact on the Linux kernel's stability due to a double-free error.
To fix CVE-2024-46673, update to a version of the Linux kernel that has patched this vulnerability.
CVE-2024-46673 affects multiple versions of the Linux kernel before specific updates in series 2.6.15 to 6.11-rc5.
CVE-2024-46673 impacts systems running affected versions of the Linux kernel, particularly those utilizing the aacraid driver.
As of now, there is no publicly known exploit specifically targeting CVE-2024-46673, but the vulnerability itself poses a risk to system integrity.