In the Linux kernel, the following vulnerability has been resolved:
irqchip/gic-v3-its: Prevent double free on error
The error handling path in its_vpe_irq_domain_alloc() causes a double free
when its_vpe_init() fails after successfully allocating at least one
interrupt. This happens because its_vpe_irq_domain_free() frees the
interrupts along with the area bitmap and the vprop_page and
its_vpe_irq_domain_alloc() subsequently frees the area bitmap and the
vprop_page again.
Fix this by unconditionally invoking its_vpe_irq_domain_free() which
handles all cases correctly and by removing the bitmap/vprop_page freeing
from its_vpe_irq_domain_alloc().
[ tglx: Massaged change log ]
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
30 Dec 2024, 17:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/03170e657f62c26834172742492a8cb8077ef792 - Patch | |
References | () https://git.kernel.org/stable/c/5b012f77abde89bf0be8a0547636184fea618137 - Patch | |
References | () https://git.kernel.org/stable/c/5dbdbe1133911ca7d8466bb86885adec32ad9438 - Patch | |
References | () https://git.kernel.org/stable/c/aa44d21574751a7d6bca892eb8e0e9ac68372e52 - Patch | |
References | () https://git.kernel.org/stable/c/b72d2b1448b682844f995e660b77f2a1fabc1662 - Patch | |
References | () https://git.kernel.org/stable/c/c26591afd33adce296c022e3480dea4282b7ef91 - Patch | |
References | () https://git.kernel.org/stable/c/dd681710ab77c8beafe2e263064cb1bd0e2d6ca9 - Patch | |
References | () https://git.kernel.org/stable/c/f5417ff561b8ac9a7e53c747b8627a7ab58378ae - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Patch | |
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* |
|
CWE | CWE-415 | |
First Time |
Debian debian Linux
Debian Linux Linux linux Kernel |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
21 Nov 2024, 09:21
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/03170e657f62c26834172742492a8cb8077ef792 - | |
References | () https://git.kernel.org/stable/c/5b012f77abde89bf0be8a0547636184fea618137 - | |
References | () https://git.kernel.org/stable/c/5dbdbe1133911ca7d8466bb86885adec32ad9438 - | |
References | () https://git.kernel.org/stable/c/aa44d21574751a7d6bca892eb8e0e9ac68372e52 - | |
References | () https://git.kernel.org/stable/c/b72d2b1448b682844f995e660b77f2a1fabc1662 - | |
References | () https://git.kernel.org/stable/c/c26591afd33adce296c022e3480dea4282b7ef91 - | |
References | () https://git.kernel.org/stable/c/dd681710ab77c8beafe2e263064cb1bd0e2d6ca9 - | |
References | () https://git.kernel.org/stable/c/f5417ff561b8ac9a7e53c747b8627a7ab58378ae - |
05 Nov 2024, 10:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Jun 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
17 May 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-17 15:15
Updated : 2024-12-30 17:41
NVD link : CVE-2024-35847
Mitre link : CVE-2024-35847
CVE.ORG link : CVE-2024-35847
JSON object : View
Products Affected
linux
- linux_kernel
debian
- debian_linux
CWE
CWE-415
Double Free