Описание
In the Linux kernel, the following vulnerability has been resolved:
x86/kexec: Fix double-free of elf header buffer
After
b3e34a47f989 ("x86/kexec: fix memory leak of elf header buffer"),
freeing image->elf_headers in the error path of crash_load_segments() is not needed because kimage_file_post_load_cleanup() will take care of that later. And not clearing it could result in a double-free.
Drop the superfluous vfree() call at the error path of crash_load_segments().
In the Linux kernel, the following vulnerability has been resolved:
x86/kexec: Fix double-free of elf header buffer
After
b3e34a47f989 ("x86/kexec: fix memory leak of elf header buffer"),
freeing image->elf_headers in the error path of crash_load_segments() is not needed because kimage_file_post_load_cleanup() will take care of that later. And not clearing it could result in a double-free.
Drop the superfluous vfree() call at the error path of crash_load_segments().
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2023-54146
- https://git.kernel.org/stable/c/4c71a552b97fb4f46eb300224434fe56fcf4f254
- https://git.kernel.org/stable/c/554a880a1fff46dd5a355dec21cd77d542a0ddf2
- https://git.kernel.org/stable/c/5bd3c7abeb69fb4133418b846a1c6dc11313d6f0
- https://git.kernel.org/stable/c/d00dd2f2645dca04cf399d8fc692f3f69b6dd996
- https://git.kernel.org/stable/c/fbdbf8ac333d3d47c0d9ea81d7d445654431d100
EPSS
CVE ID
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: x86/kexec: Fix double-free of elf header buffer After b3e34a47f989 ("x86/kexec: fix memory leak of elf header buffer"), freeing image->elf_headers in the error path of crash_load_segments() is not needed because kimage_file_post_load_cleanup() will take care of that later. And not clearing it could result in a double-free. Drop the superfluous vfree() call at the error path of crash_load_segments().
In the Linux kernel, the following vulnerability has been resolved: x86/kexec: Fix double-free of elf header buffer After b3e34a47f989 ("x86/kexec: fix memory leak of elf header buffer"), freeing image->elf_headers in the error path of crash_load_segments() is not needed because kimage_file_post_load_cleanup() will take care of that later. And not clearing it could result in a double-free. Drop the superfluous vfree() call at the error path of crash_load_segments().
In the Linux kernel, the following vulnerability has been resolved: x ...
Уязвимость функции crash_load_segments() модуля arch/x86/kernel/crash.c поддержки платформы x86 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
EPSS