CVE-2022-49950

Source
https://cve.org/CVERecord?id=CVE-2022-49950
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49950.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49950
Downstream
Related
Published
2025-06-18T11:00:13.985Z
Modified
2026-04-03T13:14:22.067033639Z
Summary
misc: fastrpc: fix memory corruption on open
Details

In the Linux kernel, the following vulnerability has been resolved:

misc: fastrpc: fix memory corruption on open

The probe session-duplication overflow check incremented the session count also when there were no more available sessions so that memory beyond the fixed-size slab-allocated session array could be corrupted in fastrpcsessionalloc() on open().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49950.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f6f9279f2bf0e37e2f1fb119d8832b8568536a04
Fixed
f8632b8bb53ebc005d8f24a68a0c1f9678c0e908
Fixed
5cf2a57c7a01a0d7bdecf875a63682f542891b1b
Fixed
cf20c3533efc89578ace94fa20a9e63446223c72
Fixed
e0578e603065f120a8759b75e0d6c216c7078a39
Fixed
d245f43aab2b61195d8ebb64cef7b5a08c590ab4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49950.json"