Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-35847
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-17 May, 2024 | 14:47
Updated At-04 May, 2025 | 09:06
Rejected At-
▼CVE Numbering Authority (CNA)
irqchip/gic-v3-its: Prevent double free on error

In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v3-its: Prevent double free on error The error handling path in its_vpe_irq_domain_alloc() causes a double free when its_vpe_init() fails after successfully allocating at least one interrupt. This happens because its_vpe_irq_domain_free() frees the interrupts along with the area bitmap and the vprop_page and its_vpe_irq_domain_alloc() subsequently frees the area bitmap and the vprop_page again. Fix this by unconditionally invoking its_vpe_irq_domain_free() which handles all cases correctly and by removing the bitmap/vprop_page freeing from its_vpe_irq_domain_alloc(). [ tglx: Massaged change log ]

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/irqchip/irq-gic-v3-its.c
Default Status
unaffected
Versions
Affected
  • From 7d75bbb4bc1ad90386776459d37e4ddfe605671e before f5417ff561b8ac9a7e53c747b8627a7ab58378ae (git)
  • From 7d75bbb4bc1ad90386776459d37e4ddfe605671e before b72d2b1448b682844f995e660b77f2a1fabc1662 (git)
  • From 7d75bbb4bc1ad90386776459d37e4ddfe605671e before aa44d21574751a7d6bca892eb8e0e9ac68372e52 (git)
  • From 7d75bbb4bc1ad90386776459d37e4ddfe605671e before 5dbdbe1133911ca7d8466bb86885adec32ad9438 (git)
  • From 7d75bbb4bc1ad90386776459d37e4ddfe605671e before dd681710ab77c8beafe2e263064cb1bd0e2d6ca9 (git)
  • From 7d75bbb4bc1ad90386776459d37e4ddfe605671e before 03170e657f62c26834172742492a8cb8077ef792 (git)
  • From 7d75bbb4bc1ad90386776459d37e4ddfe605671e before 5b012f77abde89bf0be8a0547636184fea618137 (git)
  • From 7d75bbb4bc1ad90386776459d37e4ddfe605671e before c26591afd33adce296c022e3480dea4282b7ef91 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/irqchip/irq-gic-v3-its.c
Default Status
affected
Versions
Affected
  • 4.14
Unaffected
  • From 0 before 4.14 (semver)
  • From 4.19.313 through 4.19.* (semver)
  • From 5.4.275 through 5.4.* (semver)
  • From 5.10.216 through 5.10.* (semver)
  • From 5.15.158 through 5.15.* (semver)
  • From 6.1.90 through 6.1.* (semver)
  • From 6.6.30 through 6.6.* (semver)
  • From 6.8.9 through 6.8.* (semver)
  • From 6.9 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/f5417ff561b8ac9a7e53c747b8627a7ab58378ae
N/A
https://git.kernel.org/stable/c/b72d2b1448b682844f995e660b77f2a1fabc1662
N/A
https://git.kernel.org/stable/c/aa44d21574751a7d6bca892eb8e0e9ac68372e52
N/A
https://git.kernel.org/stable/c/5dbdbe1133911ca7d8466bb86885adec32ad9438
N/A
https://git.kernel.org/stable/c/dd681710ab77c8beafe2e263064cb1bd0e2d6ca9
N/A
https://git.kernel.org/stable/c/03170e657f62c26834172742492a8cb8077ef792
N/A
https://git.kernel.org/stable/c/5b012f77abde89bf0be8a0547636184fea618137
N/A
https://git.kernel.org/stable/c/c26591afd33adce296c022e3480dea4282b7ef91
N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/f5417ff561b8ac9a7e53c747b8627a7ab58378ae
x_transferred
https://git.kernel.org/stable/c/b72d2b1448b682844f995e660b77f2a1fabc1662
x_transferred
https://git.kernel.org/stable/c/aa44d21574751a7d6bca892eb8e0e9ac68372e52
x_transferred
https://git.kernel.org/stable/c/5dbdbe1133911ca7d8466bb86885adec32ad9438
x_transferred
https://git.kernel.org/stable/c/dd681710ab77c8beafe2e263064cb1bd0e2d6ca9
x_transferred
https://git.kernel.org/stable/c/03170e657f62c26834172742492a8cb8077ef792
x_transferred
https://git.kernel.org/stable/c/5b012f77abde89bf0be8a0547636184fea618137
x_transferred
https://git.kernel.org/stable/c/c26591afd33adce296c022e3480dea4282b7ef91
x_transferred
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
x_transferred
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
x_transferred
Details not found