CVE-2024-53213

Severity CVSS v4.0:
Pending analysis
Type:
CWE-415 Double Free
Publication date:
27/12/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: usb: lan78xx: Fix double free issue with interrupt buffer allocation<br /> <br /> In lan78xx_probe(), the buffer `buf` was being freed twice: once<br /> implicitly through `usb_free_urb(dev-&gt;urb_intr)` with the<br /> `URB_FREE_BUFFER` flag and again explicitly by `kfree(buf)`. This caused<br /> a double free issue.<br /> <br /> To resolve this, reordered `kmalloc()` and `usb_alloc_urb()` calls to<br /> simplify the initialization sequence and removed the redundant<br /> `kfree(buf)`. Now, `buf` is allocated after `usb_alloc_urb()`, ensuring<br /> it is correctly managed by `usb_fill_int_urb()` and freed by<br /> `usb_free_urb()` as intended.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.17 (including) 6.1.120 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.64 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.11.11 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.12 (including) 6.12.2 (excluding)