In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Fix double free of the ha->vp_map pointer
Coverity scan reported potential risk of double free of the pointer ha->vpmap. ha->vpmap was freed in qla2x00memalloc(), and again freed in function qla2x00memfree(ha).
Assign NULL to vp_map and kfree take care of NULL.
[
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/scsi/qla2xxx/qla_os.c"
},
"digest": {
"line_hashes": [
"151079816564165859269711104175649203146",
"132917625163615392071822950740714900728",
"337789331388409399245309380022482878302",
"277930944766374557458093951852714978646"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f14cee7a882cb79528f17a2335f53e9fd1848467",
"signature_version": "v1",
"id": "CVE-2024-26930-20c07696"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/scsi/qla2xxx/qla_os.c"
},
"digest": {
"line_hashes": [
"151079816564165859269711104175649203146",
"132917625163615392071822950740714900728",
"337789331388409399245309380022482878302",
"277930944766374557458093951852714978646"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e288285d47784fdcf7c81be56df7d65c6f10c58b",
"signature_version": "v1",
"id": "CVE-2024-26930-2c2d9867"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/scsi/qla2xxx/qla_os.c",
"function": "qla2x00_mem_alloc"
},
"digest": {
"length": 13257.0,
"function_hash": "313151717742263950350845198058750423978"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e288285d47784fdcf7c81be56df7d65c6f10c58b",
"signature_version": "v1",
"id": "CVE-2024-26930-4d614390"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/scsi/qla2xxx/qla_os.c",
"function": "qla2x00_mem_alloc"
},
"digest": {
"length": 13257.0,
"function_hash": "313151717742263950350845198058750423978"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f14cee7a882cb79528f17a2335f53e9fd1848467",
"signature_version": "v1",
"id": "CVE-2024-26930-add8667d"
}
]