Description
In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v3-its: Prevent double free on error The error handling path in its_vpe_irq_domain_alloc() causes a double free when its_vpe_init() fails after successfully allocating at least one interrupt. This happens because its_vpe_irq_domain_free() frees the interrupts along with the area bitmap and the vprop_page and its_vpe_irq_domain_alloc() subsequently frees the area bitmap and the vprop_page again. Fix this by unconditionally invoking its_vpe_irq_domain_free() which handles all cases correctly and by removing the bitmap/vprop_page freeing from its_vpe_irq_domain_alloc(). [ tglx: Massaged change log ]
References (10)
Scores
CVSS v3
7.8
EPSS
0.0002
EPSS Percentile
5.9%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-415
Status
published
Products (10)
debian/debian_linux
10.0
linux/Kernel
4.14.0 - 4.19.313linux
linux/Kernel
4.20.0 - 5.4.275linux
linux/Kernel
5.11.0 - 5.15.158linux
linux/Kernel
5.16.0 - 6.1.90linux
linux/Kernel
5.5.0 - 5.10.216linux
linux/Kernel
6.2.0 - 6.6.30linux
linux/Kernel
6.7.0 - 6.8.9linux
linux/linux_kernel
6.9 rc1 (5 CPE variants)
linux/linux_kernel
4.14 - 4.19.313
Published
May 17, 2024
Tracked Since
Feb 18, 2026