In the Linux kernel, the following vulnerability has been resolved: selinux: fix double free of condlist on error paths On error path from condreadlist() and duplicatepolicydbcondlist() the condlistdestroy() gets called a second time in caller functions, resulting in NULL pointer deref. Fix this by resetting the condlistlen to 0 in condlistdestroy(), making subsequent calls a noop. Also consistently reset the cond_list pointer to NULL after freeing. [PM: fix line lengths in the description]
{ "binaries": [ { "binary_version": "5.15.0-1008.11~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1008-intel-iotg" }, { "binary_version": "5.15.0-1008.11~20.04.1", "binary_name": "linux-cloud-tools-5.15.0-1008-intel-iotg" }, { "binary_version": "5.15.0-1008.11~20.04.1", "binary_name": "linux-headers-5.15.0-1008-intel-iotg" }, { "binary_version": "5.15.0-1008.11~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1008-intel-iotg" }, { "binary_version": "5.15.0-1008.11~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1008-intel-iotg-dbgsym" }, { "binary_version": "5.15.0-1008.11~20.04.1", "binary_name": "linux-intel-iotg-5.15-cloud-tools-5.15.0-1008" }, { "binary_version": "5.15.0-1008.11~20.04.1", "binary_name": "linux-intel-iotg-5.15-cloud-tools-common" }, { "binary_version": "5.15.0-1008.11~20.04.1", "binary_name": "linux-intel-iotg-5.15-headers-5.15.0-1008" }, { "binary_version": "5.15.0-1008.11~20.04.1", "binary_name": "linux-intel-iotg-5.15-tools-5.15.0-1008" }, { "binary_version": "5.15.0-1008.11~20.04.1", "binary_name": "linux-intel-iotg-5.15-tools-common" }, { "binary_version": "5.15.0-1008.11~20.04.1", "binary_name": "linux-intel-iotg-5.15-tools-host" }, { "binary_version": "5.15.0-1008.11~20.04.1", "binary_name": "linux-modules-5.15.0-1008-intel-iotg" }, { "binary_version": "5.15.0-1008.11~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1008-intel-iotg" }, { "binary_version": "5.15.0-1008.11~20.04.1", "binary_name": "linux-tools-5.15.0-1008-intel-iotg" } ], "availability": "No subscription required" }