Double Free The advisory has been revoked - it doesn't affect any version of package bpftool  (opens in a new tab)


Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Double Free vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CENTOS8-BPFTOOL-7324933
  • published21 Jun 2024
  • disclosed20 Jun 2024

Introduced: 20 Jun 2024

CVE-2022-48740  (opens in a new tab)
CWE-415  (opens in a new tab)

Amendment

The Centos security team deemed this advisory irrelevant for Centos:8.

NVD Description

Note: Versions mentioned in the description apply only to the upstream bpftool package and not the bpftool package as distributed by Centos.

In the Linux kernel, the following vulnerability has been resolved:

selinux: fix double free of cond_list on error paths

On error path from cond_read_list() and duplicate_policydb_cond_list() the cond_list_destroy() gets called a second time in caller functions, resulting in NULL pointer deref. Fix this by resetting the cond_list_len to 0 in cond_list_destroy(), making subsequent calls a noop.

Also consistently reset the cond_list pointer to NULL after freeing.

[PM: fix line lengths in the description]