CVE-2024-35847

HIGH

Linux Kernel < 4.19.313 - Double Free

Title source: rule
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v3-its: Prevent double free on error The error handling path in its_vpe_irq_domain_alloc() causes a double free when its_vpe_init() fails after successfully allocating at least one interrupt. This happens because its_vpe_irq_domain_free() frees the interrupts along with the area bitmap and the vprop_page and its_vpe_irq_domain_alloc() subsequently frees the area bitmap and the vprop_page again. Fix this by unconditionally invoking its_vpe_irq_domain_free() which handles all cases correctly and by removing the bitmap/vprop_page freeing from its_vpe_irq_domain_alloc(). [ tglx: Massaged change log ]

Scores

CVSS v3 7.8
EPSS 0.0002
EPSS Percentile 5.9%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-415
Status published
Products (10)
debian/debian_linux 10.0
linux/Kernel 4.14.0 - 4.19.313linux
linux/Kernel 4.20.0 - 5.4.275linux
linux/Kernel 5.11.0 - 5.15.158linux
linux/Kernel 5.16.0 - 6.1.90linux
linux/Kernel 5.5.0 - 5.10.216linux
linux/Kernel 6.2.0 - 6.6.30linux
linux/Kernel 6.7.0 - 6.8.9linux
linux/linux_kernel 6.9 rc1 (5 CPE variants)
linux/linux_kernel 4.14 - 4.19.313
Published May 17, 2024
Tracked Since Feb 18, 2026