๐Ÿ” CVE Alert

CVE-2024-46673

UNKNOWN 0.0

scsi: aacraid: Fix double-free on probe failure

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: scsi: aacraid: Fix double-free on probe failure aac_probe_one() calls hardware-specific init functions through the aac_driver_ident::init pointer, all of which eventually call down to aac_init_adapter(). If aac_init_adapter() fails after allocating memory for aac_dev::queues, it frees the memory but does not clear that member. After the hardware-specific init function returns an error, aac_probe_one() goes down an error path that frees the memory pointed to by aac_dev::queues, resulting.in a double-free.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 13, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
8e0c5ebde82b08f6d996e11983890fc4cc085fab < d237c7d06ffddcdb5d36948c527dc01284388218 8e0c5ebde82b08f6d996e11983890fc4cc085fab < 564e1986b00c5f05d75342f8407f75f0a17b94df 8e0c5ebde82b08f6d996e11983890fc4cc085fab < 9e96dea7eff6f2bbcd0b42a098012fc66af9eb69 8e0c5ebde82b08f6d996e11983890fc4cc085fab < 85449b28ff6a89c4513115e43ddcad949b5890c9 8e0c5ebde82b08f6d996e11983890fc4cc085fab < 60962c3d8e18e5d8dfa16df788974dd7f35bd87a 8e0c5ebde82b08f6d996e11983890fc4cc085fab < 8a3995a3ffeca280a961b59f5c99843d81b15929 8e0c5ebde82b08f6d996e11983890fc4cc085fab < 4b540ec7c0045c2d01c4e479f34bbc8f147afa4c 8e0c5ebde82b08f6d996e11983890fc4cc085fab < 919ddf8336f0b84c0453bac583808c9f165a85c2
Linux / Linux
2.6.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/d237c7d06ffddcdb5d36948c527dc01284388218 git.kernel.org: https://git.kernel.org/stable/c/564e1986b00c5f05d75342f8407f75f0a17b94df git.kernel.org: https://git.kernel.org/stable/c/9e96dea7eff6f2bbcd0b42a098012fc66af9eb69 git.kernel.org: https://git.kernel.org/stable/c/85449b28ff6a89c4513115e43ddcad949b5890c9 git.kernel.org: https://git.kernel.org/stable/c/60962c3d8e18e5d8dfa16df788974dd7f35bd87a git.kernel.org: https://git.kernel.org/stable/c/8a3995a3ffeca280a961b59f5c99843d81b15929 git.kernel.org: https://git.kernel.org/stable/c/4b540ec7c0045c2d01c4e479f34bbc8f147afa4c git.kernel.org: https://git.kernel.org/stable/c/919ddf8336f0b84c0453bac583808c9f165a85c2 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html