摘要:
In the Linux kernel, the following vulnerability has been resolved:
mctp: fix use after free
Clang static analysis reports this problem
route.c:425:4: warning: Use of memory after it is freed
trace_mctp_key_acquire(key);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
When mctp_key_add() fails, key is freed but then is later
used in trace_mctp_key_acquire(). Add an else statement
to use the key only when mctp_key_add() is successful.
安全等级: Low
公告ID: KylinSec-SA-2024-3350
发布日期: 2024年8月21日
关联CVE: CVE-2022-48782
In the Linux kernel, the following vulnerability has been resolved:
mctp: fix use after free
Clang static analysis reports this problem
route.c:425:4: warning: Use of memory after it is freed
trace_mctp_key_acquire(key);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
When mctp_key_add() fails, key is freed but then is later
used in trace_mctp_key_acquire(). Add an else statement
to use the key only when mctp_key_add() is successful.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2022-48782 | KY3.4-5A | kernel | Unaffected |
CVE-2022-48782 | KY3.5.3 | kernel | Unaffected |
CVE-2022-48782 | V6 | kernel | Unaffected |