First published: Mon Feb 26 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: i2c: Fix a potential use after free Free the adap structure only after we are done using it. This patch just moves the put_device() down a bit to avoid the use after free. [wsa: added comment to the code, added Fixes tag]
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=4.3.0<4.14.291 | |
Linux Kernel | >=4.15.0<4.19.256 | |
Linux Kernel | >=4.20.0<5.4.211 | |
Linux Kernel | >=5.5.0<5.10.137 | |
Linux Kernel | >=5.11.0<5.15.61 | |
Linux Kernel | >=5.16.0<5.18.18 | |
Linux Kernel | >=5.19.0<5.19.2 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-25162 has been classified with a medium severity level due to potential use after free vulnerabilities in the Linux kernel.
To fix CVE-2019-25162, update your Linux kernel to a version that includes the patch, such as 5.10.223-1 or later.
CVE-2019-25162 affects multiple versions of the Linux kernel, specifically between 4.3.0 and 5.19.0.
CVE-2019-25162 is not specific to a single distribution; it affects the Linux kernel used by various distributions.
The risks associated with CVE-2019-25162 include possible system crashes or unauthorized access due to improper memory handling.