More information about this CVE will likely be available in a few days
Description
In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: Fix use-after-free and race in fastrpc_map_find Currently, there is a race window between the point when the mutex is unlocked in fastrpc_map_lookup and the reference count increasing (fastrpc_map_get) in fastrpc_map_find, which can also lead to use-after-free. So lets merge fastrpc_map_find into fastrpc_map_lookup which allows us to both protect the maps list by also taking the &fl->lock spinlock and the reference count, since the spinlock will be released only after. Add take_ref argument to make this suitable for all callers.
Related CPE's
Could not find any relations
References
Weaknesses
Could not find any weaknesses
CVSS impact metrics
Could not find any metrics
Information
Source identifier
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Vulnerability status
Awaiting analysis
Published
2024-08-21T07:15:04.383
3 weeks agoLast modified
2024-08-21T12:30:33.697
3 weeks ago