-

CVE-2022-50785

fsi: occ: Prevent use after free

In the Linux kernel, the following vulnerability has been resolved:

fsi: occ: Prevent use after free

Use get_device and put_device in the open and close functions to
make sure the device doesn't get freed while a file descriptor is
open.
Also, lock around the freeing of the device buffer and check the
buffer before using it in the submit function.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version 008d3825a805557464c5e75f9eb806a3aa2f5e6d
Version < 1d5ad0a874ddfcee9f932f54b1d34cbe8b9ddcfe
Status affected
Version 008d3825a805557464c5e75f9eb806a3aa2f5e6d
Version < 3593e8efc9f0dac6be70bd5c964eadaa86bf2713
Status affected
Version 008d3825a805557464c5e75f9eb806a3aa2f5e6d
Version < d3e1e24604031b0d83b6c2d38f54eeea265cfcc0
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.16
Status affected
Version 0
Version < 5.16
Status unaffected
Version <= 5.19.*
Version 5.19.17
Status unaffected
Version <= 6.0.*
Version 6.0.3
Status unaffected
Version <= *
Version 6.1
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.092
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.