In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: fix memory corruption on open The probe session-duplication overflow check incremented the session count also when there were no more available sessions so that memory beyond the fixed-size slab-allocated session array could be corrupted in fastrpc_session_alloc() on open().
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025061810-CVE-2022-49950-2eaf@gregkh/T