Home

Description

In the Linux kernel, the following vulnerability has been resolved: fsi: occ: Prevent use after free Use get_device and put_device in the open and close functions to make sure the device doesn't get freed while a file descriptor is open. Also, lock around the freeing of the device buffer and check the buffer before using it in the submit function.

PUBLISHED Reserved 2025-12-24 | Published 2025-12-30 | Updated 2026-01-02 | Assigner Linux

Product status

Default status
unaffected

008d3825a805557464c5e75f9eb806a3aa2f5e6d (git) before 1d5ad0a874ddfcee9f932f54b1d34cbe8b9ddcfe
affected

008d3825a805557464c5e75f9eb806a3aa2f5e6d (git) before 3593e8efc9f0dac6be70bd5c964eadaa86bf2713
affected

008d3825a805557464c5e75f9eb806a3aa2f5e6d (git) before d3e1e24604031b0d83b6c2d38f54eeea265cfcc0
affected

Default status
affected

5.16
affected

Any version before 5.16
unaffected

5.19.17 (semver)
unaffected

6.0.3 (semver)
unaffected

6.1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/1d5ad0a874ddfcee9f932f54b1d34cbe8b9ddcfe

git.kernel.org/...c/3593e8efc9f0dac6be70bd5c964eadaa86bf2713

git.kernel.org/...c/d3e1e24604031b0d83b6c2d38f54eeea265cfcc0

cve.org (CVE-2022-50785)

nvd.nist.gov (CVE-2022-50785)

Download JSON