In the Linux kernel, the following vulnerability has been resolved:
misc: microchip: pci1xxxx: fix double free in the error handling of gp_aux_bus_probe()
When auxiliary_device_add() returns error and then calls
auxiliary_device_uninit(), callback function
gp_auxiliary_device_release() calls ida_free() and
kfree(aux_device_wrapper) to free memory. We should't
call them again in the error handling path.
Fix this by skipping the redundant cleanup functions.
                
            Metrics
Affected Vendors & Products
References
        History
                    Fri, 10 Jan 2025 18:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Linux Linux linux Kernel | |
| Weaknesses | CWE-415 | |
| CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:* | |
| Vendors & Products | Linux Linux linux Kernel | |
| Metrics | cvssV3_1 
 | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Linux
Published: 2024-06-17T17:51:52.112Z
Updated: 2025-05-04T09:13:09.116Z
Reserved: 2024-05-30T15:25:07.082Z
Link: CVE-2024-36973
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-02T03:43:50.488Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-06-17T18:15:17.043
Modified: 2025-01-10T18:03:24.737
Link: CVE-2024-36973
 Redhat
                        Redhat