In the Linux kernel, the following vulnerability has been resolved:
misc: fastrpc: Fix double free of 'buf' in error path
smatch warning:
drivers/misc/fastrpc.c:1926 fastrpc_req_mmap() error: double free of 'buf'
In fastrpc_req_mmap() error path, the fastrpc buffer is freed in
fastrpc_req_munmap_impl() if unmap is successful.
But in the end, there is an unconditional call to fastrpc_buf_free().
So the above case triggers the double free of fastrpc buf.
References
Configurations
Configuration 1 (hide)
|
History
20 Sep 2024, 18:33
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-415 | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/bfc1704d909dc9911a558b1a5833d3d61a43a1f2 - Patch | |
References | () https://git.kernel.org/stable/c/e8c276d4dc0e19ee48385f74426aebc855b49aaf - Patch | |
References | () https://git.kernel.org/stable/c/f77dc8a75859e559f3238a6d906206259227985e - Patch | |
First Time |
Linux linux Kernel
Linux |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
20 Sep 2024, 12:30
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
18 Sep 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-18 08:15
Updated : 2024-09-20 18:33
NVD link : CVE-2024-46741
Mitre link : CVE-2024-46741
CVE.ORG link : CVE-2024-46741
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-415
Double Free