跳转到帖子

Red Hat: CVE-2024-27043: kernel: media: edia: dvbdev: fix a use-after-free (Multiple Advisories)

recommended_posts

发布于
  • Members

Red Hat: CVE-2024-27043: kernel: media: edia: dvbdev: fix a use-after-free (Multiple Advisories)

Severity
5
CVSS
(AV:L/AC:H/Au:M/C:P/I:P/A:C)
Published
05/01/2024
Created
02/11/2025
Added
02/10/2025
Modified
02/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved: media: edia: dvbdev: fix a use-after-free In dvb_register_device, *pdvbdev is set equal to dvbdev, which is freed in several error-handling paths. However, *pdvbdev is not set to NULL after dvbdev's deallocation, causing use-after-frees in many places, for example, in the following call chain: budget_register |-> dvb_dmxdev_init |-> dvb_register_device |-> dvb_dmxdev_release |-> dvb_unregister_device |-> dvb_remove_device |-> dvb_device_put |-> kref_put When calling dvb_unregister_device, dmxdev->dvbdev (i.e. *pdvbdev in dvb_register_device) could point to memory that had been freed in dvb_register_device. Thereafter, this pointer is transferred to kref_put and triggering a use-after-free.

Solution(s)

  • redhat-upgrade-kernel
  • redhat-upgrade-kernel-rt

References

  • CVE-2024-27043
  • RHSA-2024:10281
  • RHSA-2024:10282
  • 查看数 696
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…