Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-42069
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-29 Jul, 2024 | 15:52
Updated At-03 Nov, 2025 | 19:30
Rejected At-
▼CVE Numbering Authority (CNA)
net: mana: Fix possible double free in error handling path

In the Linux kernel, the following vulnerability has been resolved: net: mana: Fix possible double free in error handling path When auxiliary_device_add() returns error and then calls auxiliary_device_uninit(), callback function adev_release calls kfree(madev). We shouldn't call kfree(madev) again in the error handling path. Set 'madev' to NULL.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/ethernet/microsoft/mana/mana_en.c
Default Status
unaffected
Versions
Affected
  • From a69839d4327d053b18d8e1b0e7ddeee78db78f4f before 3243e64eb4d897c3eeb48b2a7221ab5a95e1282a (git)
  • From a69839d4327d053b18d8e1b0e7ddeee78db78f4f before ed45c0a0b662079d4c0e518014cc148c753979b4 (git)
  • From a69839d4327d053b18d8e1b0e7ddeee78db78f4f before 1864b8224195d0e43ddb92a8151f54f6562090cc (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/ethernet/microsoft/mana/mana_en.c
Default Status
affected
Versions
Affected
  • 6.2
Unaffected
  • From 0 before 6.2 (semver)
  • From 6.6.37 through 6.6.* (semver)
  • From 6.9.8 through 6.9.* (semver)
  • From 6.10 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/3243e64eb4d897c3eeb48b2a7221ab5a95e1282a
N/A
https://git.kernel.org/stable/c/ed45c0a0b662079d4c0e518014cc148c753979b4
N/A
https://git.kernel.org/stable/c/1864b8224195d0e43ddb92a8151f54f6562090cc
N/A
Hyperlink: https://git.kernel.org/stable/c/3243e64eb4d897c3eeb48b2a7221ab5a95e1282a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/ed45c0a0b662079d4c0e518014cc148c753979b4
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/1864b8224195d0e43ddb92a8151f54f6562090cc
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/3243e64eb4d897c3eeb48b2a7221ab5a95e1282a
x_transferred
https://git.kernel.org/stable/c/ed45c0a0b662079d4c0e518014cc148c753979b4
x_transferred
https://git.kernel.org/stable/c/1864b8224195d0e43ddb92a8151f54f6562090cc
x_transferred
https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html
N/A
Hyperlink: https://git.kernel.org/stable/c/3243e64eb4d897c3eeb48b2a7221ab5a95e1282a
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/ed45c0a0b662079d4c0e518014cc148c753979b4
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/1864b8224195d0e43ddb92a8151f54f6562090cc
Resource:
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html
Resource: N/A
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found