In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Fix double free of the ha->vp_map pointer
Coverity scan reported potential risk of double free of the pointer ha->vpmap. ha->vpmap was freed in qla2x00memalloc(), and again freed in function qla2x00memfree(ha).
Assign NULL to vp_map and kfree take care of NULL.
{ "vanir_signatures": [ { "target": { "file": "drivers/scsi/qla2xxx/qla_os.c" }, "id": "CVE-2024-26930-20c07696", "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "151079816564165859269711104175649203146", "132917625163615392071822950740714900728", "337789331388409399245309380022482878302", "277930944766374557458093951852714978646" ] }, "deprecated": false, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f14cee7a882cb79528f17a2335f53e9fd1848467" }, { "target": { "file": "drivers/scsi/qla2xxx/qla_os.c" }, "id": "CVE-2024-26930-2c2d9867", "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "151079816564165859269711104175649203146", "132917625163615392071822950740714900728", "337789331388409399245309380022482878302", "277930944766374557458093951852714978646" ] }, "deprecated": false, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e288285d47784fdcf7c81be56df7d65c6f10c58b" }, { "target": { "file": "drivers/scsi/qla2xxx/qla_os.c", "function": "qla2x00_mem_alloc" }, "id": "CVE-2024-26930-4d614390", "signature_version": "v1", "digest": { "length": 13257.0, "function_hash": "313151717742263950350845198058750423978" }, "deprecated": false, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e288285d47784fdcf7c81be56df7d65c6f10c58b" }, { "target": { "file": "drivers/scsi/qla2xxx/qla_os.c" }, "id": "CVE-2024-26930-845d61c8", "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "151079816564165859269711104175649203146", "132917625163615392071822950740714900728", "337789331388409399245309380022482878302", "277930944766374557458093951852714978646" ] }, "deprecated": false, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b7deb675d674f44e0ddbab87fee8f9f098925e73" }, { "target": { "file": "drivers/scsi/qla2xxx/qla_os.c", "function": "qla2x00_mem_alloc" }, "id": "CVE-2024-26930-add8667d", "signature_version": "v1", "digest": { "length": 13257.0, "function_hash": "313151717742263950350845198058750423978" }, "deprecated": false, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f14cee7a882cb79528f17a2335f53e9fd1848467" }, { "target": { "file": "drivers/scsi/qla2xxx/qla_os.c", "function": "qla2x00_mem_alloc" }, "id": "CVE-2024-26930-baa4c06a", "signature_version": "v1", "digest": { "length": 13257.0, "function_hash": "313151717742263950350845198058750423978" }, "deprecated": false, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@825d63164a2e6bacb059a9afb5605425b485413f" }, { "target": { "file": "drivers/scsi/qla2xxx/qla_os.c" }, "id": "CVE-2024-26930-de86bfb2", "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "151079816564165859269711104175649203146", "132917625163615392071822950740714900728", "337789331388409399245309380022482878302", "277930944766374557458093951852714978646" ] }, "deprecated": false, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@825d63164a2e6bacb059a9afb5605425b485413f" }, { "target": { "file": "drivers/scsi/qla2xxx/qla_os.c", "function": "qla2x00_mem_alloc" }, "id": "CVE-2024-26930-e41913d2", "signature_version": "v1", "digest": { "length": 13257.0, "function_hash": "313151717742263950350845198058750423978" }, "deprecated": false, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b7deb675d674f44e0ddbab87fee8f9f098925e73" } ] }