Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scmi: Fix double free in OPTEE transport Channels can be shared between protocols, avoid freeing the same channel descriptors twice when unloading the stack.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.18, < 6.1.113 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/6699567b0bbb378600a4dc0a1f929439a4e84a2cPatch
- https://git.kernel.org/stable/c/aef6ae124bb3cc12e34430fed91fbb7efd7a444dPatch
- https://git.kernel.org/stable/c/d7f4fc2bc101e666da649605a9ece2bd42529c7aPatch
- https://git.kernel.org/stable/c/dc9543a4f2a5498a4a12d6d2427492a6f1a28056Patch
- https://git.kernel.org/stable/c/e98dba934b2fc587eafb83f47ad64d9053b18ae0Patch
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
FAQ
What is CVE-2024-49853?
CVE-2024-49853 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scmi: Fix double free in OPTEE transport Channels can be shared between protocols, avoid freeing the same channel de...
How severe is CVE-2024-49853?
CVE-2024-49853 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-49853?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.