摘要:
In the Linux kernel, the following vulnerability has been resolved:
selinux: fix double free of cond_list on error paths
On error path from cond_read_list() and duplicate_policydb_cond_list()
the cond_list_destroy() gets called a second time in caller functions,
resulting in NULL pointer deref. Fix this by resetting the
cond_list_len to 0 in cond_list_destroy(), making subsequent calls a
noop.
Also consistently reset the cond_list pointer to NULL after freeing.
[PM: fix line lengths in the description]
安全等级: Low
公告ID: KylinSec-SA-2024-2884
发布日期: 2024年6月26日
关联CVE: CVE-2022-48740
In the Linux kernel, the following vulnerability has been resolved:
selinux: fix double free of cond_list on error paths
On error path from cond_read_list() and duplicate_policydb_cond_list()
the cond_list_destroy() gets called a second time in caller functions,
resulting in NULL pointer deref. Fix this by resetting the
cond_list_len to 0 in cond_list_destroy(), making subsequent calls a
noop.
Also consistently reset the cond_list pointer to NULL after freeing.
[PM: fix line lengths in the description]
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2022-48740 | KY3.4-5 | kernel | Unaffected |
CVE-2022-48740 | KY3.5.3 | kernel | Unaffected |
CVE-2022-48740 | V6 | kernel | Unaffected |