In the Linux kernel, the following vulnerability has been resolved:
net: hso: fix NULL-deref on disconnect regression
Commit 8a12f8836145 ("net: hso: fix null-ptr-deref during tty device
unregistration") fixed the racy minor allocation reported by syzbot, but
introduced an unconditional NULL-pointer dereference on every disconnect
instead.
Specifically, the serial device table must no longer be accessed after
the minor has been released by hso_serial_tty_unregister().
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/0c71d4c89559f72cec2592d078681a843bce570e - Patch | |
References | () https://git.kernel.org/stable/c/0f000005da31f6947f843ce6b3e3a960540c6e00 - Patch | |
References | () https://git.kernel.org/stable/c/24b699bea7553fc0b98dad9d864befb6005ac7f1 - Patch | |
References | () https://git.kernel.org/stable/c/2ad5692db72874f02b9ad551d26345437ea4f7f3 - Patch | |
References | () https://git.kernel.org/stable/c/41c44e1f3112d7265dae522c026399b2a42d19ef - Patch | |
References | () https://git.kernel.org/stable/c/5871761c5f0f20d6e98bf3b6bd7486d857589554 - Patch | |
References | () https://git.kernel.org/stable/c/5c17cfe155d21954b4c7e2a78fa771cebcd86725 - Patch | |
References | () https://git.kernel.org/stable/c/90642ee9eb581a13569b1c0bd57e85d962215273 - Patch | |
References | () https://git.kernel.org/stable/c/d7fad2ce15bdbbd0fec3ebe999fd7cab2267f53e - Patch |
17 Apr 2024, 19:30
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:5.12:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.12:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.12:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.12:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.12:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.12:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.12:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.12:rc6:*:*:*:*:*:* |
|
First Time |
Linux linux Kernel
Linux |
|
CWE | CWE-476 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
References | () https://git.kernel.org/stable/c/0c71d4c89559f72cec2592d078681a843bce570e - Patch | |
References | () https://git.kernel.org/stable/c/0f000005da31f6947f843ce6b3e3a960540c6e00 - Patch | |
References | () https://git.kernel.org/stable/c/24b699bea7553fc0b98dad9d864befb6005ac7f1 - Patch | |
References | () https://git.kernel.org/stable/c/2ad5692db72874f02b9ad551d26345437ea4f7f3 - Patch | |
References | () https://git.kernel.org/stable/c/41c44e1f3112d7265dae522c026399b2a42d19ef - Patch | |
References | () https://git.kernel.org/stable/c/5871761c5f0f20d6e98bf3b6bd7486d857589554 - Patch | |
References | () https://git.kernel.org/stable/c/5c17cfe155d21954b4c7e2a78fa771cebcd86725 - Patch | |
References | () https://git.kernel.org/stable/c/90642ee9eb581a13569b1c0bd57e85d962215273 - Patch | |
References | () https://git.kernel.org/stable/c/d7fad2ce15bdbbd0fec3ebe999fd7cab2267f53e - Patch |
04 Apr 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Feb 2024, 16:32
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-26 16:27
Updated : 2024-11-21 06:34
NVD link : CVE-2021-46905
Mitre link : CVE-2021-46905
CVE.ORG link : CVE-2021-46905
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference