We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix not cleanup led when bt_init fails bt_init() calls bt_leds_init() to register led, but if it fails later, bt_leds_cleanup() is not called to unregister it. This can cause panic if the argument "bluetooth-power" in text is freed and then another led_trigger_register() tries to access it: BUG: unable to handle page fault for address: ffffffffc06d3bc0 RIP: 0010:strcmp+0xc/0x30 Call Trace: <TASK> led_trigger_register+0x10d/0x4f0 led_trigger_register_simple+0x7d/0x100 bt_init+0x39/0xf7 [bluetooth] do_one_initcall+0xd0/0x4e0
Reserved 2024-08-22 | Published 2024-10-21 | Updated 2024-12-19 | Assigner Linuxgit.kernel.org/...c/8a66c3a94285552f6a8e45d73b34ebbad11d388b
git.kernel.org/...c/2c6cf0afc3856359e620e96edd952457d258e16c
git.kernel.org/...c/e7b950458156d410509a08c41930b75e72985938
git.kernel.org/...c/edf7284a98296369dd0891a0457eec37df244873
git.kernel.org/...c/5ecf7cd6fde5e72c87122084cf00d63e35d8dd9f
git.kernel.org/...c/2f3957c7eb4e07df944169a3e50a4d6790e1c744
Support options