In the Linux kernel, the following vulnerability has been resolved:Revert "tty: n_gsm: fix UAF in gsm_cleanup_mux"This reverts commit 9b9c8195f3f0d74a826077fc1c01b9ee74907239.The commit above is reverted as it did not solve the original issue.gsm_cleanup_mux() tries to free up the virtual ttys by callinggsm_dlci_release() for each available DLCI. There, dlci_put() is called todecrease the reference counter for the DLCI via tty_port_put() whichfinally calls gsm_dlci_free(). This already clears the pointer which isbeing checked in gsm_cleanup_mux() before calling gsm_dlci_release().Therefore, it is not necessary to clear this pointer in gsm_cleanup_mux()as done in the reverted commit. The commit introduces a null pointerdereference:
- http://www.openwall.com/lists/oss-security/2024/04/11/9
No PoCs found on GitHub currently.