In the Linux kernel, the following vulnerability has been resolved:
selinux: fix double free of cond_list on error paths
On error path from cond_read_list() and duplicate_policydb_cond_list()
the cond_list_destroy() gets called a second time in caller functions,
resulting in NULL pointer deref. Fix this by resetting the
cond_list_len to 0 in cond_list_destroy(), making subsequent calls a
noop.
Also consistently reset the cond_list pointer to NULL after freeing.
[PM: fix line lengths in the description]
References
Configurations
Configuration 1 (hide)
|
History
27 May 2025, 18:31
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:* |
Information
Published : 2024-06-20 12:15
Updated : 2025-05-27 18:31
NVD link : CVE-2022-48740
Mitre link : CVE-2022-48740
CVE.ORG link : CVE-2022-48740
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-415
Double Free