The Linux Kernel, the operating system core itself.
Security Fix(es):
In the Linux kernel, the following vulnerability has been resolved:
uio: Fix use-after-free in uio_open
uiounregisterdevice uioopen idev = idrfind() deviceunregister(&idev->dev) putdevice(&idev->dev) uiodevicerelease getdevice(&idev->dev) kfree(idev) uiofreeminor(minor) uiorelease put_device(&idev->dev)
In the core-1 uiounregisterdevice(), the deviceunregister will kfree idev when the idev->dev kobject ref is 1. But after core-1 deviceunregister, putdevice and before doing kfree, the core-2 may getdevice. Then: 1. After core-1 kfree idev, the core-2 will do use-after-free for idev. 2. When core-2 do uiorelease and putdevice, the idev will be double freed.
To address this issue, we can get idev atomic & inc idev reference with minor_lock.(CVE-2023-52439)
NULL Pointer Dereference vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (net, bluetooth modules) allows Overflow Buffers. This vulnerability is associated with program files /net/bluetooth/rfcomm/core.C.
This issue affects Linux kernel: v2.6.12-rc2.
(CVE-2024-22099)
{ "severity": "High" }
{ "src": [ "kernel-4.19.90-2403.2.0.0269.oe2003sp4.src.rpm" ], "x86_64": [ "kernel-tools-4.19.90-2403.2.0.0269.oe2003sp4.x86_64.rpm", "python3-perf-4.19.90-2403.2.0.0269.oe2003sp4.x86_64.rpm", "python2-perf-debuginfo-4.19.90-2403.2.0.0269.oe2003sp4.x86_64.rpm", "python2-perf-4.19.90-2403.2.0.0269.oe2003sp4.x86_64.rpm", "kernel-debugsource-4.19.90-2403.2.0.0269.oe2003sp4.x86_64.rpm", "kernel-4.19.90-2403.2.0.0269.oe2003sp4.x86_64.rpm", "kernel-tools-debuginfo-4.19.90-2403.2.0.0269.oe2003sp4.x86_64.rpm", "kernel-debuginfo-4.19.90-2403.2.0.0269.oe2003sp4.x86_64.rpm", "kernel-tools-devel-4.19.90-2403.2.0.0269.oe2003sp4.x86_64.rpm", "bpftool-debuginfo-4.19.90-2403.2.0.0269.oe2003sp4.x86_64.rpm", "perf-debuginfo-4.19.90-2403.2.0.0269.oe2003sp4.x86_64.rpm", "bpftool-4.19.90-2403.2.0.0269.oe2003sp4.x86_64.rpm", "perf-4.19.90-2403.2.0.0269.oe2003sp4.x86_64.rpm", "kernel-devel-4.19.90-2403.2.0.0269.oe2003sp4.x86_64.rpm", "kernel-source-4.19.90-2403.2.0.0269.oe2003sp4.x86_64.rpm", "python3-perf-debuginfo-4.19.90-2403.2.0.0269.oe2003sp4.x86_64.rpm" ], "aarch64": [ "kernel-debuginfo-4.19.90-2403.2.0.0269.oe2003sp4.aarch64.rpm", "python2-perf-4.19.90-2403.2.0.0269.oe2003sp4.aarch64.rpm", "bpftool-4.19.90-2403.2.0.0269.oe2003sp4.aarch64.rpm", "python3-perf-4.19.90-2403.2.0.0269.oe2003sp4.aarch64.rpm", "kernel-devel-4.19.90-2403.2.0.0269.oe2003sp4.aarch64.rpm", "kernel-tools-devel-4.19.90-2403.2.0.0269.oe2003sp4.aarch64.rpm", "kernel-tools-debuginfo-4.19.90-2403.2.0.0269.oe2003sp4.aarch64.rpm", "kernel-tools-4.19.90-2403.2.0.0269.oe2003sp4.aarch64.rpm", "perf-debuginfo-4.19.90-2403.2.0.0269.oe2003sp4.aarch64.rpm", "python2-perf-debuginfo-4.19.90-2403.2.0.0269.oe2003sp4.aarch64.rpm", "perf-4.19.90-2403.2.0.0269.oe2003sp4.aarch64.rpm", "kernel-debugsource-4.19.90-2403.2.0.0269.oe2003sp4.aarch64.rpm", "python3-perf-debuginfo-4.19.90-2403.2.0.0269.oe2003sp4.aarch64.rpm", "bpftool-debuginfo-4.19.90-2403.2.0.0269.oe2003sp4.aarch64.rpm", "kernel-4.19.90-2403.2.0.0269.oe2003sp4.aarch64.rpm", "kernel-source-4.19.90-2403.2.0.0269.oe2003sp4.aarch64.rpm" ] }