CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
In the Linux kernel, the following vulnerability has been resolved:
misc: fastrpc: Fix use-after-free and race in fastrpc_map_find
Currently, there is a race window between the point when the mutex is
unlocked in fastrpc_map_lookup and the reference count increasing
(fastrpc_map_get) in fastrpc_map_find, which can also lead to
use-after-free.
So lets merge fastrpc_map_find into fastrpc_map_lookup which allows us
to both protect the maps list by also taking the &fl->lock spinlock and
the reference count, since the spinlock will be released only after.
Add take_ref argument to make this suitable for all callers.
git.kernel.org/linus/9446fa1683a7e3937d9970248ced427c1983a1c5 (6.2-rc5)
git.kernel.org/stable/c/9446fa1683a7e3937d9970248ced427c1983a1c5
git.kernel.org/stable/c/a50c5c25b6e7d2824698c0e6385f882a18f4a498
launchpad.net/bugs/cve/CVE-2022-48874
nvd.nist.gov/vuln/detail/CVE-2022-48874
security-tracker.debian.org/tracker/CVE-2022-48874
www.cve.org/CVERecord?id=CVE-2022-48874