VYPR
Unrated severityNVD Advisory· Published Jun 20, 2024· Updated Dec 23, 2025

selinux: fix double free of cond_list on error paths

CVE-2022-48740

Description

In the Linux kernel, the following vulnerability has been resolved:

selinux: fix double free of cond_list on error paths

On error path from cond_read_list() and duplicate_policydb_cond_list() the cond_list_destroy() gets called a second time in caller functions, resulting in NULL pointer deref. Fix this by resetting the cond_list_len to 0 in cond_list_destroy(), making subsequent calls a noop.

Also consistently reset the cond_list pointer to NULL after freeing.

[PM: fix line lengths in the description]

Affected products

118

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.