CVE-2021-47358

In the Linux kernel, the following vulnerability has been resolved: staging: greybus: uart: fix tty use after free User space can hold a tty open indefinitely and tty drivers must not release the underlying structures until the last user is gone. Switch to using the tty-port reference counter to manage the life time of the greybus tty state to avoid use after free after a disconnect.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*

History

26 Dec 2024, 19:31

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416
References () https://git.kernel.org/stable/c/4dc56951a8d9d61d364d346c61a5f1d70b4f5e14 - () https://git.kernel.org/stable/c/4dc56951a8d9d61d364d346c61a5f1d70b4f5e14 - Patch
References () https://git.kernel.org/stable/c/64062fcaca8872f063ec9da011e7bf30470be33f - () https://git.kernel.org/stable/c/64062fcaca8872f063ec9da011e7bf30470be33f - Patch
References () https://git.kernel.org/stable/c/92b67aaafb7c449db9f0c3dcabc0ff967cb3a42d - () https://git.kernel.org/stable/c/92b67aaafb7c449db9f0c3dcabc0ff967cb3a42d - Patch
References () https://git.kernel.org/stable/c/92dc0b1f46e12cfabd28d709bb34f7a39431b44f - () https://git.kernel.org/stable/c/92dc0b1f46e12cfabd28d709bb34f7a39431b44f - Patch
References () https://git.kernel.org/stable/c/9872ff6fdce8b229f01993b611b5d1719cb70ff1 - () https://git.kernel.org/stable/c/9872ff6fdce8b229f01993b611b5d1719cb70ff1 - Patch
References () https://git.kernel.org/stable/c/a5cfd51f6348e8fd7531461366946039c29c7e69 - () https://git.kernel.org/stable/c/a5cfd51f6348e8fd7531461366946039c29c7e69 - Patch
References () https://git.kernel.org/stable/c/b9e697e60ce9890e9258a73eb061288e7d68e5e6 - () https://git.kernel.org/stable/c/b9e697e60ce9890e9258a73eb061288e7d68e5e6 - Patch
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*

21 Nov 2024, 06:35

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: staging: greybus: uart: corrige el use after free de tty. El espacio de usuario puede mantener un tty abierto indefinidamente y los controladores de tty no deben liberar las estructuras subyacentes hasta que el último usuario se haya ido. Cambie al uso del contador de referencia del puerto tty para administrar la vida útil del estado tty de greybus para evitar su uso después de una desconexión.
References () https://git.kernel.org/stable/c/4dc56951a8d9d61d364d346c61a5f1d70b4f5e14 - () https://git.kernel.org/stable/c/4dc56951a8d9d61d364d346c61a5f1d70b4f5e14 -
References () https://git.kernel.org/stable/c/64062fcaca8872f063ec9da011e7bf30470be33f - () https://git.kernel.org/stable/c/64062fcaca8872f063ec9da011e7bf30470be33f -
References () https://git.kernel.org/stable/c/92b67aaafb7c449db9f0c3dcabc0ff967cb3a42d - () https://git.kernel.org/stable/c/92b67aaafb7c449db9f0c3dcabc0ff967cb3a42d -
References () https://git.kernel.org/stable/c/92dc0b1f46e12cfabd28d709bb34f7a39431b44f - () https://git.kernel.org/stable/c/92dc0b1f46e12cfabd28d709bb34f7a39431b44f -
References () https://git.kernel.org/stable/c/9872ff6fdce8b229f01993b611b5d1719cb70ff1 - () https://git.kernel.org/stable/c/9872ff6fdce8b229f01993b611b5d1719cb70ff1 -
References () https://git.kernel.org/stable/c/a5cfd51f6348e8fd7531461366946039c29c7e69 - () https://git.kernel.org/stable/c/a5cfd51f6348e8fd7531461366946039c29c7e69 -
References () https://git.kernel.org/stable/c/b9e697e60ce9890e9258a73eb061288e7d68e5e6 - () https://git.kernel.org/stable/c/b9e697e60ce9890e9258a73eb061288e7d68e5e6 -

21 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 15:15

Updated : 2024-12-26 19:31


NVD link : CVE-2021-47358

Mitre link : CVE-2021-47358

CVE.ORG link : CVE-2021-47358


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free