First published: Tue May 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: misc/libmasm/module: Fix two use after free in ibmasm_init_one In ibmasm_init_one, it calls ibmasm_init_remote_input_dev(). Inside ibmasm_init_remote_input_dev, mouse_dev and keybd_dev are allocated by input_allocate_device(), and assigned to sp->remote.mouse_dev and sp->remote.keybd_dev respectively. In the err_free_devices error branch of ibmasm_init_one, mouse_dev and keybd_dev are freed by input_free_device(), and return error. Then the execution runs into error_send_message error branch of ibmasm_init_one, where ibmasm_free_remote_input_dev(sp) is called to unregister the freed sp->remote.mouse_dev and sp->remote.keybd_dev. My patch add a "error_init_remote" label to handle the error of ibmasm_init_remote_input_dev(), to avoid the uaf bugs.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | <4.4.276 | |
Linux kernel | >=4.5<4.9.276 | |
Linux kernel | >=4.10<4.14.240 | |
Linux kernel | >=4.15<4.19.198 | |
Linux kernel | >=4.20<5.4.134 | |
Linux kernel | >=5.5<5.10.52 | |
Linux kernel | >=5.11<5.12.19 | |
Linux kernel | >=5.13<5.13.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47334 has a high severity level due to use-after-free vulnerabilities found in the Linux kernel.
To fix CVE-2021-47334, update your Linux kernel to a version later than 4.4.276, 4.9.276, 4.14.240, 4.19.198, 5.4.134, 5.10.52, 5.12.19, or 5.13.4.
CVE-2021-47334 affects Linux kernel versions from 4.4 up to 5.13.4 prior to updates.
CVE-2021-47334 is categorized as a use-after-free vulnerability.
Yes, CVE-2021-47334 can potentially allow attackers to exploit the system, leading to unauthorized access or denial of service.