CVE-2024-46673
scsi: aacraid: Fix double-free on probe failure
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: scsi: aacraid: Fix double-free on probe failure aac_probe_one() calls hardware-specific init functions through the aac_driver_ident::init pointer, all of which eventually call down to aac_init_adapter(). If aac_init_adapter() fails after allocating memory for aac_dev::queues, it frees the memory but does not clear that member. After the hardware-specific init function returns an error, aac_probe_one() goes down an error path that frees the memory pointed to by aac_dev::queues, resulting.in a double-free.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Sep 13, 2024 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
8e0c5ebde82b08f6d996e11983890fc4cc085fab < d237c7d06ffddcdb5d36948c527dc01284388218 8e0c5ebde82b08f6d996e11983890fc4cc085fab < 564e1986b00c5f05d75342f8407f75f0a17b94df 8e0c5ebde82b08f6d996e11983890fc4cc085fab < 9e96dea7eff6f2bbcd0b42a098012fc66af9eb69 8e0c5ebde82b08f6d996e11983890fc4cc085fab < 85449b28ff6a89c4513115e43ddcad949b5890c9 8e0c5ebde82b08f6d996e11983890fc4cc085fab < 60962c3d8e18e5d8dfa16df788974dd7f35bd87a 8e0c5ebde82b08f6d996e11983890fc4cc085fab < 8a3995a3ffeca280a961b59f5c99843d81b15929 8e0c5ebde82b08f6d996e11983890fc4cc085fab < 4b540ec7c0045c2d01c4e479f34bbc8f147afa4c 8e0c5ebde82b08f6d996e11983890fc4cc085fab < 919ddf8336f0b84c0453bac583808c9f165a85c2
Linux / Linux
2.6.15
References
git.kernel.org: https://git.kernel.org/stable/c/d237c7d06ffddcdb5d36948c527dc01284388218 git.kernel.org: https://git.kernel.org/stable/c/564e1986b00c5f05d75342f8407f75f0a17b94df git.kernel.org: https://git.kernel.org/stable/c/9e96dea7eff6f2bbcd0b42a098012fc66af9eb69 git.kernel.org: https://git.kernel.org/stable/c/85449b28ff6a89c4513115e43ddcad949b5890c9 git.kernel.org: https://git.kernel.org/stable/c/60962c3d8e18e5d8dfa16df788974dd7f35bd87a git.kernel.org: https://git.kernel.org/stable/c/8a3995a3ffeca280a961b59f5c99843d81b15929 git.kernel.org: https://git.kernel.org/stable/c/4b540ec7c0045c2d01c4e479f34bbc8f147afa4c git.kernel.org: https://git.kernel.org/stable/c/919ddf8336f0b84c0453bac583808c9f165a85c2 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html