vulnerability
Ubuntu: (CVE-2022-48740): linux-intel-iotg-5.15 vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | 2024-06-20 | 2024-11-19 | 2025-01-28 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
2024-06-20
Added
2024-11-19
Modified
2025-01-28
Description
In the Linux kernel, the following vulnerability has been resolved:
selinux: fix double free of cond_list on error paths
On error path from cond_read_list() and duplicate_policydb_cond_list()
the cond_list_destroy() gets called a second time in caller functions,
resulting in NULL pointer deref. Fix this by resetting the
cond_list_len to 0 in cond_list_destroy(), making subsequent calls a
noop.
Also consistently reset the cond_list pointer to NULL after freeing.
[PM: fix line lengths in the description]
Solution
ubuntu-upgrade-linux-intel-iotg-5-15
References
- CVE-2022-48740
- https://attackerkb.com/topics/CVE-2022-48740
- URL-https://git.kernel.org/linus/186edf7e368c40d06cf727a1ad14698ea67b74ad
- URL-https://git.kernel.org/stable/c/186edf7e368c40d06cf727a1ad14698ea67b74ad
- URL-https://git.kernel.org/stable/c/70caa32e6d81f45f0702070c0e4dfe945e92fbd7
- URL-https://git.kernel.org/stable/c/7ed9cbf7ac0d4ed86b356e1b944304ae9ee450d4
- URL-https://git.kernel.org/stable/c/f446089a268c8fc6908488e991d28a9b936293db
- URL-https://www.cve.org/CVERecord?id=CVE-2022-48740

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.