First published: Sat Dec 28 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: 9p/xen: fix release of IRQ Kernel logs indicate an IRQ was double-freed. Pass correct device ID during IRQ release. [Dominique: remove confusing variable reset to 0]
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=4.12<4.19.325 | |
Linux Kernel | >=4.20<5.4.287 | |
Linux Kernel | >=5.5<5.10.231 | |
Linux Kernel | >=5.11<5.15.174 | |
Linux Kernel | >=5.16<6.1.120 | |
Linux Kernel | >=6.2<6.6.64 | |
Linux Kernel | >=6.7<6.11.11 | |
Linux Kernel | >=6.12<6.12.2 | |
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-56704 is categorized as moderate due to the risk of IRQ double-freed issues leading to possible system instability.
To fix CVE-2024-56704, you should update your Linux kernel to the latest stable version that contains the patch for this vulnerability.
CVE-2024-56704 affects Linux kernel versions from 4.12 to 6.12.x, excluding patched versions.
Systems running affected versions of the Linux kernel, particularly those utilizing the 9p file system, are impacted by CVE-2024-56704.
CVE-2024-56704 is not directly classified as a remote exploit, as it primarily involves local system vulnerabilities related to IRQ handling.