CVE-2024-46741

Source
https://cve.org/CVERecord?id=CVE-2024-46741
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46741.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-46741
Downstream
Related
Published
2024-09-18T07:12:02.496Z
Modified
2026-03-20T12:37:52.066061Z
Summary
misc: fastrpc: Fix double free of 'buf' in error path
Details

In the Linux kernel, the following vulnerability has been resolved:

misc: fastrpc: Fix double free of 'buf' in error path

smatch warning: drivers/misc/fastrpc.c:1926 fastrpcreqmmap() error: double free of 'buf'

In fastrpcreqmmap() error path, the fastrpc buffer is freed in fastrpcreqmunmap_impl() if unmap is successful.

But in the end, there is an unconditional call to fastrpcbuffree(). So the above case triggers the double free of fastrpc buf.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/46xxx/CVE-2024-46741.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
72fa6f7820c4cf96c5f7aabc4e54bdf52d1e2ac2
Fixed
f77dc8a75859e559f3238a6d906206259227985e
Fixed
bfc1704d909dc9911a558b1a5833d3d61a43a1f2
Fixed
e8c276d4dc0e19ee48385f74426aebc855b49aaf

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46741.json"