CVE-2022-48740

Source
https://cve.org/CVERecord?id=CVE-2022-48740
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48740.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48740
Downstream
Related
Published
2024-06-20T11:13:25.346Z
Modified
2026-03-13T05:40:30.428918Z
Summary
selinux: fix double free of cond_list on error paths
Details

In the Linux kernel, the following vulnerability has been resolved:

selinux: fix double free of cond_list on error paths

On error path from condreadlist() and duplicatepolicydbcondlist() the condlistdestroy() gets called a second time in caller functions, resulting in NULL pointer deref. Fix this by resetting the condlistlen to 0 in condlist_destroy(), making subsequent calls a noop.

Also consistently reset the cond_list pointer to NULL after freeing.

[PM: fix line lengths in the description]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48740.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
60abd3181db29ea81742106cc0ac2e27fd05b418
Fixed
f446089a268c8fc6908488e991d28a9b936293db
Fixed
70caa32e6d81f45f0702070c0e4dfe945e92fbd7
Fixed
7ed9cbf7ac0d4ed86b356e1b944304ae9ee450d4
Fixed
186edf7e368c40d06cf727a1ad14698ea67b74ad

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48740.json"