Description
In the Linux kernel, the following vulnerability has been resolved: fsi: occ: Prevent use after free Use get_device and put_device in the open and close functions to make sure the device doesn't get freed while a file descriptor is open. Also, lock around the freeing of the device buffer and check the buffer before using it in the submit function.
Product status
008d3825a805557464c5e75f9eb806a3aa2f5e6d (git) before 1d5ad0a874ddfcee9f932f54b1d34cbe8b9ddcfe
008d3825a805557464c5e75f9eb806a3aa2f5e6d (git) before 3593e8efc9f0dac6be70bd5c964eadaa86bf2713
008d3825a805557464c5e75f9eb806a3aa2f5e6d (git) before d3e1e24604031b0d83b6c2d38f54eeea265cfcc0
5.16
Any version before 5.16
5.19.17 (semver)
6.0.3 (semver)
6.1 (original_commit_for_fix)
References
git.kernel.org/...c/1d5ad0a874ddfcee9f932f54b1d34cbe8b9ddcfe
git.kernel.org/...c/3593e8efc9f0dac6be70bd5c964eadaa86bf2713
git.kernel.org/...c/d3e1e24604031b0d83b6c2d38f54eeea265cfcc0