irqchip/gic-v3-its: Prevent double free on error
The error handling path in its_vpe_irq_domain_alloc() causes a double free
when its_vpe_init() fails after successfully allocating at least one
interrupt. This happens because its_vpe_irq_domain_free() frees the
interrupts along with the area bitmap and the vprop_page and
its_vpe_irq_domain_alloc() subsequently frees the area bitmap and the
vprop_page again.
Fix this by unconditionally invoking its_vpe_irq_domain_free() which
handles all cases correctly and by removing the bitmap/vprop_page freeing
from its_vpe_irq_domain_alloc().
[ tglx: Massaged change log ]
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DLA-3840-1 | linux security update |
![]() |
DLA-3842-1 | linux-5.10 security update |
![]() |
USN-6896-1 | Linux kernel vulnerabilities |
![]() |
USN-6896-2 | Linux kernel vulnerabilities |
![]() |
USN-6896-3 | Linux kernel vulnerabilities |
![]() |
USN-6896-4 | Linux kernel vulnerabilities |
![]() |
USN-6896-5 | Linux kernel vulnerabilities |
![]() |
USN-6898-1 | Linux kernel vulnerabilities |
![]() |
USN-6898-2 | Linux kernel vulnerabilities |
![]() |
USN-6898-3 | Linux kernel kernel vulnerabilities |
![]() |
USN-6898-4 | Linux kernel vulnerabilities |
![]() |
USN-6917-1 | Linux kernel vulnerabilities |
![]() |
USN-6919-1 | Linux kernel vulnerabilities |
![]() |
USN-6927-1 | Linux kernel vulnerabilities |
![]() |
USN-6949-1 | Linux kernel vulnerabilities |
![]() |
USN-6949-2 | Linux kernel vulnerabilities |
![]() |
USN-6952-1 | Linux kernel vulnerabilities |
![]() |
USN-6955-1 | Linux kernel (OEM) vulnerabilities |
![]() |
USN-7019-1 | Linux kernel vulnerabilities |
![]() |
USN-7185-1 | Linux kernel vulnerabilities |
![]() |
USN-7185-2 | Linux kernel (Azure) vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 25 Jun 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhel Eus
|
|
CPEs | cpe:/a:redhat:rhel_eus:9.4 | |
Vendors & Products |
Redhat rhel Eus
|
Mon, 30 Dec 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Debian
Debian debian Linux Linux Linux linux Kernel |
|
Weaknesses | CWE-415 | |
CPEs | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:* |
|
Vendors & Products |
Debian
Debian debian Linux Linux Linux linux Kernel |
|
Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 13 Nov 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:9 |
Wed, 06 Nov 2024 08:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Metrics |
ssvc
|
Thu, 08 Aug 2024 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/a:redhat:enterprise_linux:8::nfv cpe:/o:redhat:enterprise_linux:8 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux |

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-05-04T09:06:44.998Z
Reserved: 2024-05-17T13:50:33.105Z
Link: CVE-2024-35847

Updated: 2024-08-02T03:21:48.906Z

Status : Analyzed
Published: 2024-05-17T15:15:21.620
Modified: 2024-12-30T17:41:16.633
Link: CVE-2024-35847


No data.