[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025061810-CVE-2022-49950-2eaf@gregkh>
Date: Wed, 18 Jun 2025 13:00:15 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2022-49950: misc: fastrpc: fix memory corruption on open
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
misc: fastrpc: fix memory corruption on open
The probe session-duplication overflow check incremented the session
count also when there were no more available sessions so that memory
beyond the fixed-size slab-allocated session array could be corrupted in
fastrpc_session_alloc() on open().
The Linux kernel CVE team has assigned CVE-2022-49950 to this issue.
Affected and fixed versions
===========================
Issue introduced in 5.1 with commit f6f9279f2bf0e37e2f1fb119d8832b8568536a04 and fixed in 5.4.213 with commit f8632b8bb53ebc005d8f24a68a0c1f9678c0e908
Issue introduced in 5.1 with commit f6f9279f2bf0e37e2f1fb119d8832b8568536a04 and fixed in 5.10.142 with commit 5cf2a57c7a01a0d7bdecf875a63682f542891b1b
Issue introduced in 5.1 with commit f6f9279f2bf0e37e2f1fb119d8832b8568536a04 and fixed in 5.15.66 with commit cf20c3533efc89578ace94fa20a9e63446223c72
Issue introduced in 5.1 with commit f6f9279f2bf0e37e2f1fb119d8832b8568536a04 and fixed in 5.19.8 with commit e0578e603065f120a8759b75e0d6c216c7078a39
Issue introduced in 5.1 with commit f6f9279f2bf0e37e2f1fb119d8832b8568536a04 and fixed in 6.0 with commit d245f43aab2b61195d8ebb64cef7b5a08c590ab4
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2022-49950
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
drivers/misc/fastrpc.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/f8632b8bb53ebc005d8f24a68a0c1f9678c0e908
https://git.kernel.org/stable/c/5cf2a57c7a01a0d7bdecf875a63682f542891b1b
https://git.kernel.org/stable/c/cf20c3533efc89578ace94fa20a9e63446223c72
https://git.kernel.org/stable/c/e0578e603065f120a8759b75e0d6c216c7078a39
https://git.kernel.org/stable/c/d245f43aab2b61195d8ebb64cef7b5a08c590ab4
Powered by blists - more mailing lists