First published: Thu Mar 06 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_tcm: Don't free command immediately Don't prematurely free the command. Wait for the status completion of the sense status. It can be freed then. Otherwise we will double-free the command.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=4.6<5.4.291 | |
Linux Kernel | >=5.5<5.10.235 | |
Linux Kernel | >=5.11<5.15.179 | |
Linux Kernel | >=5.16<6.1.129 | |
Linux Kernel | >=6.2<6.6.76 | |
Linux Kernel | >=6.7<6.12.13 | |
Linux Kernel | >=6.13<6.13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-58055 has been rated as a high-severity vulnerability due to the potential for causing double-free errors in the Linux kernel.
To fix CVE-2024-58055, apply the latest patches or updates provided for the Linux kernel that address this vulnerability.
CVE-2024-58055 can lead to system instability or crashes due to double-free issues in the USB gadget functionality.
While CVE-2024-58055 is primarily a stability issue, exploitation could lead to unauthorized access or data corruption in vulnerable systems.
CVE-2024-58055 affects certain releases of the Linux kernel where the USB gadget functionality is implemented.