In the Linux kernel, the following vulnerability has been...
High severity
Unreviewed
Published
Jun 20, 2024
to the GitHub Advisory Database
•
Updated Aug 19, 2024
Description
Published by the National Vulnerability Database
Jun 20, 2024
Published to the GitHub Advisory Database
Jun 20, 2024
Last updated
Aug 19, 2024
In the Linux kernel, the following vulnerability has been resolved:
selinux: fix double free of cond_list on error paths
On error path from cond_read_list() and duplicate_policydb_cond_list()
the cond_list_destroy() gets called a second time in caller functions,
resulting in NULL pointer deref. Fix this by resetting the
cond_list_len to 0 in cond_list_destroy(), making subsequent calls a
noop.
Also consistently reset the cond_list pointer to NULL after freeing.
[PM: fix line lengths in the description]
References