ACK: [SRU][J][PATCH 0/1] CVE-2024-50073
Chia-Lin Kao (AceLan)
acelan.kao at canonical.com
Mon Jul 7 01:23:38 UTC 2025
On Sat, Jun 21, 2025 at 03:15:19PM +0200, Massimiliano Pellizzer wrote:
> https://ubuntu.com/security/CVE-2024-50073
>
> [ Impact ]
>
> tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
>
> gsm_msg on the tx_ctrl_list or tx_data_list of gsm_mux
> can be freed by multi threads through ioctl,which leads
> to the occurrence of uaf. Protect it by gsm tx lock.
>
> [ Fix ]
>
> Plucky: not affected
> Noble: fixed via upstream stable updates (LP: #2097393)
> Jammy: fix backported from mainline
>
> [ Test Plan ]
>
> Compile tested only.
>
> [ Where Problems Could Occur ]
>
> The fix affects the GSM 07.10 multiplexer line discipline in the TTY subsystem.
> An issue with this fix may introduce problems such as improper acquisition
> or release of the tx_lock spinlock, potentially resulting in deadlocks during
> multiplexer teardown or data transmission.
> As a consequence, regular users may experience hangs or stalls in applications
> communicating over GSM virtual TTYs.
>
>
Acked-by: Chia-Lin Kao (AceLan) <acelan.kao at canonical.com>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
More information about the kernel-team
mailing list