CVE-2021-47525

In the Linux kernel, the following vulnerability has been resolved: serial: liteuart: fix use-after-free and memleak on unbind Deregister the port when unbinding the driver to prevent it from being used after releasing the driver data and leaking memory allocated by serial core.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

10 Jun 2024, 18:41

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/05f929b395dec8957b636ff14e66b277ed022ed9 - () https://git.kernel.org/stable/c/05f929b395dec8957b636ff14e66b277ed022ed9 - Patch
References () https://git.kernel.org/stable/c/602824cf9aa9db8830ffe5cfb2cd54365cada4fe - () https://git.kernel.org/stable/c/602824cf9aa9db8830ffe5cfb2cd54365cada4fe - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: serial: liteuart: corrige use-after-free y memleak al desvincular. Cancelar el registro del puerto al desvincular el controlador para evitar que se use después de liberar los datos del controlador y pérdida de memoria asignada por el núcleo serie.
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-416

24 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-24 15:15

Updated : 2024-06-10 18:41


NVD link : CVE-2021-47525

Mitre link : CVE-2021-47525

CVE.ORG link : CVE-2021-47525


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free