In the Linux kernel, the following vulnerability has been resolved:
misc: fastrpc: Fix double free of 'buf' in error path
smatch warning:
drivers/misc/fastrpc.c:1926 fastrpc_req_mmap() error: double free of 'buf'
In fastrpc_req_mmap() error path, the fastrpc buffer is freed in
fastrpc_req_munmap_impl() if unmap is successful.
But in the end, there is an unconditional call to fastrpc_buf_free().
So the above case triggers the double free of fastrpc buf.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-09-18 08:15
Updated : 2024-09-20 18:33
NVD link : CVE-2024-46741
Mitre link : CVE-2024-46741
CVE.ORG link : CVE-2024-46741
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-415
Double Free