Home

Description

In the Linux kernel, the following vulnerability has been resolved: fsi: occ: Prevent use after free Use get_device and put_device in the open and close functions to make sure the device doesn't get freed while a file descriptor is open. Also, lock around the freeing of the device buffer and check the buffer before using it in the submit function.

PUBLISHED Reserved 2025-12-24 | Published 2025-12-30 | Updated 2025-12-30 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 1d5ad0a874ddfcee9f932f54b1d34cbe8b9ddcfe
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 3593e8efc9f0dac6be70bd5c964eadaa86bf2713
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before d3e1e24604031b0d83b6c2d38f54eeea265cfcc0
affected

Default status
affected

5.19.17 (semver)
unaffected

6.0.3 (semver)
unaffected

6.1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/1d5ad0a874ddfcee9f932f54b1d34cbe8b9ddcfe

git.kernel.org/...c/3593e8efc9f0dac6be70bd5c964eadaa86bf2713

git.kernel.org/...c/d3e1e24604031b0d83b6c2d38f54eeea265cfcc0

cve.org (CVE-2022-50785)

nvd.nist.gov (CVE-2022-50785)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.