In the Linux kernel, the following vulnerability has been resolved:misc: fastrpc: fix memory corruption on openThe probe session-duplication overflow check incremented the sessioncount also when there were no more available sessions so that memorybeyond the fixed-size slab-allocated session array could be corrupted infastrpc_session_alloc() on open().
No PoCs from references.
- https://github.com/ARPSyndicate/cve-scores