First published: Tue Oct 29 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: pinctrl: nuvoton: fix a double free in ma35_pinctrl_dt_node_to_map_func() 'new_map' is allocated using devm_* which takes care of freeing the allocated data on device removal, call to .dt_free_map = pinconf_generic_dt_free_map double frees the map as pinconf_generic_dt_free_map() calls pinctrl_utils_free_map(). Fix this by using kcalloc() instead of auto-managed devm_kcalloc().
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.11<6.11.5 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50071 has not been assigned a specific severity rating, but it involves a double free vulnerability in the Linux kernel.
To fix CVE-2024-50071, ensure you update to a patched version of the Linux kernel that addresses this vulnerability.
CVE-2024-50071 affects Linux kernel versions from 6.11 to 6.12-rc3 inclusive.
CVE-2024-50071 is related to a double free issue, which could potentially lead to undefined behavior, but remote code execution is not explicitly indicated.
If you cannot update immediately, consider implementing temporary workarounds or configurations to mitigate the risk associated with CVE-2024-50071.