CVE-2021-47334

Updated: 2025-01-14 17:49:13.006877

Description:

In the Linux kernel, the following vulnerability has been resolved: misc/libmasm/module: Fix two use after free in ibmasm_init_one In ibmasm_init_one, it calls ibmasm_init_remote_input_dev(). Inside ibmasm_init_remote_input_dev, mouse_dev and keybd_dev are allocated by input_allocate_device(), and assigned to sp->remote.mouse_dev and sp->remote.keybd_dev respectively. In the err_free_devices error branch of ibmasm_init_one, mouse_dev and keybd_dev are freed by input_free_device(), and return error. Then the execution runs into error_send_message error branch of ibmasm_init_one, where ibmasm_free_remote_input_dev(sp) is called to unregister the freed sp->remote.mouse_dev and sp->remote.keybd_dev. My patch add a "error_init_remote" label to handle the error of ibmasm_init_remote_input_dev(), to avoid the uaf bugs.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

CentOS 6 ELS kernel 2.6.32 7.8 HIGH Released CLSA-2025:1740656525 2025-03-12 23:16:31
CloudLinux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2025-02-24 06:43:26
Oracle Linux 6 ELS kernel 2.6.32 7.8 HIGH Released CLSA-2025:1740598467 2025-02-26 21:54:47
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.8 HIGH Already Fixed 2025-01-21 00:21:14
Ubuntu 16.04 ELS linux 4.4.0 7.8 HIGH Released CLSA-2025:1738957378 2025-02-07 22:58:20