Assigner | Linux |
Reserved | 2024-02-20 |
Published | 2024-02-23 |
Updated | 2024-05-29 |
Description
In the Linux kernel, the following vulnerability has been resolved: serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed Returning an error code from .remove() makes the driver core emit the little helpful error message: remove callback returned a non-zero value. This will be ignored. and then remove the device anyhow. So all resources that were not freed are leaked in this case. Skipping serial8250_unregister_port() has the potential to keep enough of the UART around to trigger a use-after-free. So replace the error return (and with it the little helpful error message) by a more useful error message and continue to cleanup.
Product status
2d66412563ef before b502fb43f7fb
d833cba201ad before bc57f3ef8a9e
e0db709a58bd before 828cd829483f
e3f0c638f428 before d74173bda29a
e3f0c638f428 before 887a558d0298
e3f0c638f428 before 95e4e0031eff
e3f0c638f428 before ad90d0358bd3
6.1
Any version before 6.1
5.4.268
5.10.209
5.15.148
6.1.75
6.6.14
6.7.2
6.8
References
https://git.kernel.org/stable/c/b502fb43f7fb55aaf07f6092ab44657595214b93
https://git.kernel.org/stable/c/bc57f3ef8a9eb0180606696f586a6dcfaa175ed0
https://git.kernel.org/stable/c/828cd829483f0cda920710997aed79130b0af690
https://git.kernel.org/stable/c/d74173bda29aba58f822175d983d07c8ed335494
https://git.kernel.org/stable/c/887a558d0298d36297daea039954c39940228d9b
https://git.kernel.org/stable/c/95e4e0031effad9837af557ecbfd4294a4d8aeee
https://git.kernel.org/stable/c/ad90d0358bd3b4554f243a425168fc7cebe7d04e