CVE-2024-56708
EDAC/igen6: Avoid segmentation fault on module unload
CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: EDAC/igen6: Avoid segmentation fault on module unload The segmentation fault happens because: During modprobe: 1. In igen6_probe(), igen6_pvt will be allocated with kzalloc() 2. In igen6_register_mci(), mci->pvt_info will point to &igen6_pvt->imc[mc] During rmmod: 1. In mci_release() in edac_mc.c, it will kfree(mci->pvt_info) 2. In igen6_remove(), it will kfree(igen6_pvt); Fix this issue by setting mci->pvt_info to NULL to avoid the double kfree.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Dec 28, 2024 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new high vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
10590a9d4f23e0a519730d79d39331df60ad2079 < 029ac07bb92d2f7502d47a4916f197a8445d83bf 10590a9d4f23e0a519730d79d39331df60ad2079 < 2a80e710bbc088a2511c159ee4d910456c5f0832 10590a9d4f23e0a519730d79d39331df60ad2079 < 830cabb61113d92a425dd3038ccedbdfb3c8d079 10590a9d4f23e0a519730d79d39331df60ad2079 < e5c7052664b61f9e2f896702d20552707d0ef60a 10590a9d4f23e0a519730d79d39331df60ad2079 < db60326f2c47b079e36785ace621eb3002db2088 10590a9d4f23e0a519730d79d39331df60ad2079 < fefaae90398d38a1100ccd73b46ab55ff4610fba
Linux / Linux
5.11
References
git.kernel.org: https://git.kernel.org/stable/c/029ac07bb92d2f7502d47a4916f197a8445d83bf git.kernel.org: https://git.kernel.org/stable/c/2a80e710bbc088a2511c159ee4d910456c5f0832 git.kernel.org: https://git.kernel.org/stable/c/830cabb61113d92a425dd3038ccedbdfb3c8d079 git.kernel.org: https://git.kernel.org/stable/c/e5c7052664b61f9e2f896702d20552707d0ef60a git.kernel.org: https://git.kernel.org/stable/c/db60326f2c47b079e36785ace621eb3002db2088 git.kernel.org: https://git.kernel.org/stable/c/fefaae90398d38a1100ccd73b46ab55ff4610fba lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html