In the Linux kernel, the following vulnerability has been resolved:
misc: fastrpc: Fix double free of 'buf' in error path
smatch warning:
drivers/misc/fastrpc.c:1926 fastrpc_req_mmap() error: double free of 'buf'
In fastrpc_req_mmap() error path, the fastrpc buffer is freed in
fastrpc_req_munmap_impl() if unmap is successful.
But in the end, there is an unconditional call to fastrpc_buf_free().
So the above case triggers the double free of fastrpc buf.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    20 Sep 2024, 18:33
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:* | |
| First Time | Linux linux Kernel Linux | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 7.8 | 
| CWE | CWE-415 | |
| References | () https://git.kernel.org/stable/c/bfc1704d909dc9911a558b1a5833d3d61a43a1f2 - Patch | |
| References | () https://git.kernel.org/stable/c/e8c276d4dc0e19ee48385f74426aebc855b49aaf - Patch | |
| References | () https://git.kernel.org/stable/c/f77dc8a75859e559f3238a6d906206259227985e - Patch | 
20 Sep 2024, 12:30
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
18 Sep 2024, 08:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-09-18 08:15
Updated : 2024-09-20 18:33
NVD link : CVE-2024-46741
Mitre link : CVE-2024-46741
CVE.ORG link : CVE-2024-46741
JSON object : View
Products Affected
                linux
- linux_kernel
CWE
                
                    
                        
                        CWE-415
                        
            Double Free
