First published: Mon Oct 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: driver core: bus: Fix double free in driver API bus_register() For bus_register(), any error which happens after kset_register() will cause that @priv are freed twice, fixed by setting @priv with NULL after the first free.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <6.6.57 | |
Linux Kernel | >=6.7<6.11.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50055 has a severity rating that reflects the potential impact of the double free vulnerability in the Linux kernel.
To fix CVE-2024-50055, update your Linux kernel to a version after 6.6.57 or ensure it is between 6.7 and 6.11.4 inclusive.
CVE-2024-50055 affects various versions of the Linux kernel, specifically those up to version 6.6.57 and between versions 6.7 and 6.11.4.
The potential impacts of CVE-2024-50055 include system crashes and unpredictable behavior due to the double free vulnerability.
Yes, CVE-2024-50055 has been publicly disclosed, detailing the fix related to the driver API's bus_register() in the Linux kernel.