CVE-2022-48874
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
21/08/2024
Last modified:
29/08/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
misc: fastrpc: Fix use-after-free and race in fastrpc_map_find<br />
<br />
Currently, there is a race window between the point when the mutex is<br />
unlocked in fastrpc_map_lookup and the reference count increasing<br />
(fastrpc_map_get) in fastrpc_map_find, which can also lead to<br />
use-after-free.<br />
<br />
So lets merge fastrpc_map_find into fastrpc_map_lookup which allows us<br />
to both protect the maps list by also taking the &fl->lock spinlock and<br />
the reference count, since the spinlock will be released only after.<br />
Add take_ref argument to make this suitable for all callers.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.18 (including) | 6.1.8 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



