CVE-2019-25162

In the Linux kernel, the following vulnerability has been resolved: i2c: Fix a potential use after free Free the adap structure only after we are done using it. This patch just moves the put_device() down a bit to avoid the use after free. [wsa: added comment to the code, added Fixes tag]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:40

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d - Patch () https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d - Patch
References () https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829 - Patch () https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829 - Patch
References () https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7 - Patch () https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7 - Patch
References () https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9 - Patch () https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9 - Patch
References () https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87 - Patch () https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87 - Patch
References () https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf - Patch () https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf - Patch
References () https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a - Patch () https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a - Patch
References () https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4 - Patch () https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4 - Patch

17 Apr 2024, 17:38

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d - () https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d - Patch
References () https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829 - () https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829 - Patch
References () https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7 - () https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7 - Patch
References () https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9 - () https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9 - Patch
References () https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87 - () https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87 - Patch
References () https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf - () https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf - Patch
References () https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a - () https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a - Patch
References () https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4 - () https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4 - Patch

26 Feb 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-26 18:15

Updated : 2024-11-21 04:40


NVD link : CVE-2019-25162

Mitre link : CVE-2019-25162

CVE.ORG link : CVE-2019-25162


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free