๐Ÿ” CVE Alert

CVE-2024-49986

UNKNOWN 0.0

platform/x86: x86-android-tablets: Fix use after free on platform_device_register() errors

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: platform/x86: x86-android-tablets: Fix use after free on platform_device_register() errors x86_android_tablet_remove() frees the pdevs[] array, so it should not be used after calling x86_android_tablet_remove(). When platform_device_register() fails, store the pdevs[x] PTR_ERR() value into the local ret variable before calling x86_android_tablet_remove() to avoid using pdevs[] after it has been freed.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
5eba0141206ea521bbcfcf5067c174e825e943dd < ba0b09a2f327319e252d8f3032019b958c0a5cd9 5eba0141206ea521bbcfcf5067c174e825e943dd < aac871e493fc8809e60209d9899b1af07e9dbfc8 5eba0141206ea521bbcfcf5067c174e825e943dd < f08adc5177bd4343df09033f62ab562c09ba7f7d 5eba0141206ea521bbcfcf5067c174e825e943dd < 73a98cf79e4dbfa3d0c363e826c65aae089b313c 5eba0141206ea521bbcfcf5067c174e825e943dd < 2fae3129c0c08e72b1fe93e61fd8fd203252094a
Linux / Linux
5.17

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/ba0b09a2f327319e252d8f3032019b958c0a5cd9 git.kernel.org: https://git.kernel.org/stable/c/aac871e493fc8809e60209d9899b1af07e9dbfc8 git.kernel.org: https://git.kernel.org/stable/c/f08adc5177bd4343df09033f62ab562c09ba7f7d git.kernel.org: https://git.kernel.org/stable/c/73a98cf79e4dbfa3d0c363e826c65aae089b313c git.kernel.org: https://git.kernel.org/stable/c/2fae3129c0c08e72b1fe93e61fd8fd203252094a lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html