CVE-2021-46905

In the Linux kernel, the following vulnerability has been resolved: net: hso: fix NULL-deref on disconnect regression Commit 8a12f8836145 ("net: hso: fix null-ptr-deref during tty device unregistration") fixed the racy minor allocation reported by syzbot, but introduced an unconditional NULL-pointer dereference on every disconnect instead. Specifically, the serial device table must no longer be accessed after the minor has been released by hso_serial_tty_unregister().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.12:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.12:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.12:rc7:*:*:*:*:*:*

History

17 Apr 2024, 19:30

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/0c71d4c89559f72cec2592d078681a843bce570e - () https://git.kernel.org/stable/c/0c71d4c89559f72cec2592d078681a843bce570e - Patch
References () https://git.kernel.org/stable/c/0f000005da31f6947f843ce6b3e3a960540c6e00 - () https://git.kernel.org/stable/c/0f000005da31f6947f843ce6b3e3a960540c6e00 - Patch
References () https://git.kernel.org/stable/c/24b699bea7553fc0b98dad9d864befb6005ac7f1 - () https://git.kernel.org/stable/c/24b699bea7553fc0b98dad9d864befb6005ac7f1 - Patch
References () https://git.kernel.org/stable/c/2ad5692db72874f02b9ad551d26345437ea4f7f3 - () https://git.kernel.org/stable/c/2ad5692db72874f02b9ad551d26345437ea4f7f3 - Patch
References () https://git.kernel.org/stable/c/41c44e1f3112d7265dae522c026399b2a42d19ef - () https://git.kernel.org/stable/c/41c44e1f3112d7265dae522c026399b2a42d19ef - Patch
References () https://git.kernel.org/stable/c/5871761c5f0f20d6e98bf3b6bd7486d857589554 - () https://git.kernel.org/stable/c/5871761c5f0f20d6e98bf3b6bd7486d857589554 - Patch
References () https://git.kernel.org/stable/c/5c17cfe155d21954b4c7e2a78fa771cebcd86725 - () https://git.kernel.org/stable/c/5c17cfe155d21954b4c7e2a78fa771cebcd86725 - Patch
References () https://git.kernel.org/stable/c/90642ee9eb581a13569b1c0bd57e85d962215273 - () https://git.kernel.org/stable/c/90642ee9eb581a13569b1c0bd57e85d962215273 - Patch
References () https://git.kernel.org/stable/c/d7fad2ce15bdbbd0fec3ebe999fd7cab2267f53e - () https://git.kernel.org/stable/c/d7fad2ce15bdbbd0fec3ebe999fd7cab2267f53e - Patch
CPE cpe:2.3:o:linux:linux_kernel:5.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.12:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.12:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.12:rc6:*:*:*:*:*:*
CWE CWE-476

04 Apr 2024, 14:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/0c71d4c89559f72cec2592d078681a843bce570e -
  • () https://git.kernel.org/stable/c/24b699bea7553fc0b98dad9d864befb6005ac7f1 -
  • () https://git.kernel.org/stable/c/5871761c5f0f20d6e98bf3b6bd7486d857589554 -

26 Feb 2024, 16:32

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-26 16:27

Updated : 2024-04-17 19:30


NVD link : CVE-2021-46905

Mitre link : CVE-2021-46905

CVE.ORG link : CVE-2021-46905


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference