CVE-2024-53213
Severity CVSS v4.0:
Pending analysis
Type:
CWE-415
Double Free
Publication date:
27/12/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: usb: lan78xx: Fix double free issue with interrupt buffer allocation<br />
<br />
In lan78xx_probe(), the buffer `buf` was being freed twice: once<br />
implicitly through `usb_free_urb(dev->urb_intr)` with the<br />
`URB_FREE_BUFFER` flag and again explicitly by `kfree(buf)`. This caused<br />
a double free issue.<br />
<br />
To resolve this, reordered `kmalloc()` and `usb_alloc_urb()` calls to<br />
simplify the initialization sequence and removed the redundant<br />
`kfree(buf)`. Now, `buf` is allocated after `usb_alloc_urb()`, ensuring<br />
it is correctly managed by `usb_fill_int_urb()` and freed by<br />
`usb_free_urb()` as intended.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.17 (including) | 6.1.120 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.64 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12 (including) | 6.12.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/03819abbeb11117dcbba40bfe322b88c0c88a6b6
- https://git.kernel.org/stable/c/7ac9f3c981eeceee2ec4d30d850f4a6f50a1ec40
- https://git.kernel.org/stable/c/977128343fc2a30737399b58df8ea77e94f164bd
- https://git.kernel.org/stable/c/a422ebec863d99d5607fb41bb7af3347fcb436d3
- https://git.kernel.org/stable/c/b09512aea6223eec756f52aa584fc29eeab57480
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html



