Bug 1222297 (CVE-2024-26653) - VUL-0: CVE-2024-26653: kernel: usb: misc: ljca: Fix double free in error handling path
Summary: VUL-0: CVE-2024-26653: kernel: usb: misc: ljca: Fix double free in error hand...
Status: RESOLVED INVALID
Alias: CVE-2024-26653
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal
Target Milestone: ---
Assignee: Kernel Bugs
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/399862/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-26653:5.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-04-04 09:15 UTC by SMASH SMASH
Modified: 2024-04-04 09:29 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-04-04 09:15:37 UTC
In the Linux kernel, the following vulnerability has been resolved:

usb: misc: ljca: Fix double free in error handling path

When auxiliary_device_add() returns error and then calls
auxiliary_device_uninit(), callback function ljca_auxdev_release
calls kfree(auxdev->dev.platform_data) to free the parameter data
of the function ljca_new_client_device. The callers of
ljca_new_client_device shouldn't call kfree() again
in the error handling path to free the platform data.

Fix this by cleaning up the redundant kfree() in all callers and
adding kfree() the passed in platform_data on errors which happen
before auxiliary_device_init() succeeds .

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-26653
https://bugzilla.redhat.com/show_bug.cgi?id=2272444
https://www.cve.org/CVERecord?id=CVE-2024-26653
https://git.kernel.org/stable/c/7c9631969287a5366bc8e39cd5abff154b35fb80
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2024/CVE-2024-26653.mbox
https://git.kernel.org/stable/c/420babea4f1881a7c4ea22a8e218b8c6895d3f21
https://git.kernel.org/stable/c/8a9f653cc852677003c23ee8075e3ed8fb4743c9
Comment 1 Robert Frohl 2024-04-04 09:29:07 UTC
does not affect our kernels, closing