Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: driver core: bus: Fix double free in driver API bus_register() For bus_register(), any error which happens after kset_register() will cause that @priv are freed twice, fixed by setting @priv with NULL after the first free.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 6.6.57 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/9ce15f68abedfae7ae0a35e95895aeddfd0f0c6aPatch
- https://git.kernel.org/stable/c/bfa54a793ba77ef696755b66f3ac4ed00c7d1248Patch
- https://git.kernel.org/stable/c/d885c464c25018b81a6b58f5d548fc2e3ef87dd1Patch
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html
FAQ
What is CVE-2024-50055?
CVE-2024-50055 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: driver core: bus: Fix double free in driver API bus_register() For bus_register(), any error which happens after kset_register() w...
How severe is CVE-2024-50055?
CVE-2024-50055 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-50055?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.