CVE-2022-48874

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
21/08/2024
Last modified:
29/08/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> misc: fastrpc: Fix use-after-free and race in fastrpc_map_find<br /> <br /> Currently, there is a race window between the point when the mutex is<br /> unlocked in fastrpc_map_lookup and the reference count increasing<br /> (fastrpc_map_get) in fastrpc_map_find, which can also lead to<br /> use-after-free.<br /> <br /> So lets merge fastrpc_map_find into fastrpc_map_lookup which allows us<br /> to both protect the maps list by also taking the &amp;fl-&gt;lock spinlock and<br /> the reference count, since the spinlock will be released only after.<br /> Add take_ref argument to make this suitable for all callers.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.18 (including) 6.1.8 (excluding)