CVE-2024-56704

In the Linux kernel, the following vulnerability has been resolved: 9p/xen: fix release of IRQ Kernel logs indicate an IRQ was double-freed. Pass correct device ID during IRQ release. [Dominique: remove confusing variable reset to 0]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

13 Jan 2025, 19:55

Type Values Removed Values Added
CWE CWE-415
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: 9p/xen: se corrige la liberación de IRQ. Los registros del kernel indican que se liberó una IRQ dos veces. Se pasa la identificación del dispositivo correcta durante la liberación de IRQ. [Dominique: se elimina la variable confusa que se restablece a 0]
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/2bb3ee1bf237557daea1d58007d2e1d4a6502ccf - () https://git.kernel.org/stable/c/2bb3ee1bf237557daea1d58007d2e1d4a6502ccf - Patch
References () https://git.kernel.org/stable/c/4950408793b118cb8075bcee1f033b543fb719fa - () https://git.kernel.org/stable/c/4950408793b118cb8075bcee1f033b543fb719fa - Patch
References () https://git.kernel.org/stable/c/530bc9f03a102fac95b07cda513bfc16ff69e0ee - () https://git.kernel.org/stable/c/530bc9f03a102fac95b07cda513bfc16ff69e0ee - Patch
References () https://git.kernel.org/stable/c/692eb06703afc3e24d889d77e94a0e20229f6a4a - () https://git.kernel.org/stable/c/692eb06703afc3e24d889d77e94a0e20229f6a4a - Patch
References () https://git.kernel.org/stable/c/7f5a2ed5c1810661e6b03f5a4ebf17682cdea850 - () https://git.kernel.org/stable/c/7f5a2ed5c1810661e6b03f5a4ebf17682cdea850 - Patch
References () https://git.kernel.org/stable/c/b9e26059664bd9ebc64a0e8f5216266fc9f84265 - () https://git.kernel.org/stable/c/b9e26059664bd9ebc64a0e8f5216266fc9f84265 - Patch
References () https://git.kernel.org/stable/c/d74b4b297097bd361b8a9abfde9b521ff464ea9c - () https://git.kernel.org/stable/c/d74b4b297097bd361b8a9abfde9b521ff464ea9c - Patch
References () https://git.kernel.org/stable/c/d888f5f5d76b2722c267e6bdf51d445d60647b7b - () https://git.kernel.org/stable/c/d888f5f5d76b2722c267e6bdf51d445d60647b7b - Patch
References () https://git.kernel.org/stable/c/e43c608f40c065b30964f0a806348062991b802d - () https://git.kernel.org/stable/c/e43c608f40c065b30964f0a806348062991b802d - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

28 Dec 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-28 10:15

Updated : 2025-01-13 19:55


NVD link : CVE-2024-56704

Mitre link : CVE-2024-56704

CVE.ORG link : CVE-2024-56704


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-415

Double Free