lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025010656-CVE-2024-56766-80a2@gregkh>
Date: Mon,  6 Jan 2025 17:21:00 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2024-56766: mtd: rawnand: fix double free in atmel_pmecc_create_user()

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

mtd: rawnand: fix double free in atmel_pmecc_create_user()

The "user" pointer was converted from being allocated with kzalloc() to
being allocated by devm_kzalloc().  Calling kfree(user) will lead to a
double free.

The Linux kernel CVE team has assigned CVE-2024-56766 to this issue.


Affected and fixed versions
===========================

	Issue introduced in 6.1.120 with commit 24cbc37e837fd9e31e5024480b779207d1d99f1d and fixed in 6.1.123 with commit 6ea15205d7e2b811fbbdf79783f686f58abfb4b7
	Issue introduced in 6.6.64 with commit f1290871c8aaeb13029390a2b6e5c05733a1be6f and fixed in 6.6.69 with commit dd45c87782738715d5e7c167f8dabf0814a7394a
	Issue introduced in 6.12.2 with commit 8ac19ec818c548c5788da5926dcc8af96fad4bb1 and fixed in 6.12.8 with commit d2f090ea57f8d6587e09d4066f740a8617767b3d
	Issue introduced in 6.13-rc1 with commit 6d734f1bfc336aaea91313a5632f2f197608fadd and fixed in 6.13-rc5 with commit d8e4771f99c0400a1873235704b28bb803c83d17
	Issue introduced in 4.19.325 with commit 2014fcea19ec27df033359a0f42db0e8ed4290a8
	Issue introduced in 5.4.287 with commit 22fbbc37edb840fd420fadf670366be9bf028426
	Issue introduced in 5.10.231 with commit 54cb5fa850f9306d84e49a3db44b7a7eb5536cd1
	Issue introduced in 5.15.174 with commit 5fe7709251e334cc27618473299c48340cecd3c8
	Issue introduced in 6.11.11 with commit bdd11a04d102f8310812aa7cec39545fdd6662d1

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2024-56766
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	drivers/mtd/nand/raw/atmel/pmecc.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/6ea15205d7e2b811fbbdf79783f686f58abfb4b7
	https://git.kernel.org/stable/c/dd45c87782738715d5e7c167f8dabf0814a7394a
	https://git.kernel.org/stable/c/d2f090ea57f8d6587e09d4066f740a8617767b3d
	https://git.kernel.org/stable/c/d8e4771f99c0400a1873235704b28bb803c83d17

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ