CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix double free of the ha->vp_map pointer Coverity scan reported potential risk of double free of the pointer ha->vp_map. ha->vp_map was freed in qla2x00_mem_alloc(), and again freed in function qla2x00_mem_free(ha). Assign NULL to vp_map and kfree take care of NULL.
git.kernel.org/linus/e288285d47784fdcf7c81be56df7d65c6f10c58b
git.kernel.org/stable/c/825d63164a2e6bacb059a9afb5605425b485413f
git.kernel.org/stable/c/b7deb675d674f44e0ddbab87fee8f9f098925e73
git.kernel.org/stable/c/e288285d47784fdcf7c81be56df7d65c6f10c58b
git.kernel.org/stable/c/f14cee7a882cb79528f17a2335f53e9fd1848467
ubuntu.com/security/CVE-2024-26930
ubuntu.com/security/notices/USN-6816-1
ubuntu.com/security/notices/USN-6817-1
ubuntu.com/security/notices/USN-6817-2
ubuntu.com/security/notices/USN-6817-3
ubuntu.com/security/notices/USN-6878-1
www.cve.org/CVERecord?id=CVE-2024-26930