In the Linux kernel, the following vulnerability has been resolved:
misc: fastrpc: Don't remove map on creater_process and device_release
Do not remove the map from the list on error path in
fastrpc_init_create_process, instead call fastrpc_map_put, to avoid
use-after-free. Do not remove it on fastrpc_device_release either,
call fastrpc_map_put instead.
The fastrpc_free_map is the only proper place to remove the map.
This is called only after the reference count is 0.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-08-21 07:15
Updated : 2024-09-06 14:44
NVD link : CVE-2022-48873
Mitre link : CVE-2022-48873
CVE.ORG link : CVE-2022-48873
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free