Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: clk: hisilicon: hi3559a: Fix an erroneous devm_kfree() 'p_clk' is an array allocated just before the for loop for all clk that need to be registered. It is incremented at each loop iteration. If a clk_register() call fails, 'p_clk' may point to something different from what should be freed. The best we can do, is to avoid this wrong release of memory.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.14, < 5.15.153 |
References
- https://git.kernel.org/stable/c/2cc572e0085ebd4b662b74a0f43222bc00df9a00Patch
- https://git.kernel.org/stable/c/3f8445f1c746fda180a7f75372ed06b24e9cefe2Patch
- https://git.kernel.org/stable/c/64c6a38136b74a2f18c42199830975edd9fbc379Patch
- https://git.kernel.org/stable/c/95d1f1228c1bb54803ae57525b76db60e99b37e4Patch
- https://git.kernel.org/stable/c/d575765b1b62e8bdb00af11caa1aabeb01763d9fPatch
- https://git.kernel.org/stable/c/e0b0d1c46a2ce1e46b79d004a7270fdef872e097Patch
- https://git.kernel.org/stable/c/2cc572e0085ebd4b662b74a0f43222bc00df9a00Patch
- https://git.kernel.org/stable/c/3f8445f1c746fda180a7f75372ed06b24e9cefe2Patch
- https://git.kernel.org/stable/c/64c6a38136b74a2f18c42199830975edd9fbc379Patch
- https://git.kernel.org/stable/c/95d1f1228c1bb54803ae57525b76db60e99b37e4Patch
- https://git.kernel.org/stable/c/d575765b1b62e8bdb00af11caa1aabeb01763d9fPatch
- https://git.kernel.org/stable/c/e0b0d1c46a2ce1e46b79d004a7270fdef872e097Patch
FAQ
What is CVE-2024-27039?
CVE-2024-27039 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: clk: hisilicon: hi3559a: Fix an erroneous devm_kfree() 'p_clk' is an array allocated just before the for loop for all clk that nee...
How severe is CVE-2024-27039?
CVE-2024-27039 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-27039?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.