CVE-2025-39870
EUVD-2025-3086423.09.2025, 06:15
In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Fix double free in idxd_setup_wqs() The clean up in idxd_setup_wqs() has had a couple bugs because the error handling is a bit subtle. It's simpler to just re-write it in a cleaner way. The issues here are: 1) If "idxd->max_wqs" is <= 0 then we call put_device(conf_dev) when "conf_dev" hasn't been initialized. 2) If kzalloc_node() fails then again "conf_dev" is invalid. It's either uninitialized or it points to the "conf_dev" from the previous iteration so it leads to a double free. It's better to free partial loop iterations within the loop and then the unwinding at the end can handle whole loop iterations. I also renamed the labels to describe what the goto does and not where the goto was located.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 6.1.140 ≤ 𝑥 < 6.1.153 |
| linux | linux_kernel | 6.6.92 ≤ 𝑥 < 6.6.107 |
| linux | linux_kernel | 6.12.30 ≤ 𝑥 < 6.12.48 |
| linux | linux_kernel | 6.14.8 ≤ 𝑥 < 6.15 |
| linux | linux_kernel | 6.15.1 ≤ 𝑥 < 6.16.8 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15:rc7 |
| linux | linux_kernel | 6.17:rc1 |
| linux | linux_kernel | 6.17:rc2 |
| linux | linux_kernel | 6.17:rc3 |
| linux | linux_kernel | 6.17:rc4 |
| linux | linux_kernel | 6.17:rc5 |
| debian | debian_linux | 11.0 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
References