Page 144 of 2468 results (0.007 seconds)

CVSS: -EPSS: 0%CPEs: 7EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: mcb: fix error handling in mcb_alloc_bus() There are two bugs: 1) If ida_simple_get() fails then this code calls put_device(carrier) but we haven't yet called get_device(carrier) and probably that leads to a use after free. 2) After device_initialize() then we need to use put_device() to release the bus. This will free the internal resources tied to the device and call mcb_free_bus() which will free the rest. En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mcb: corrige el manejo de errores en mcb_alloc_bus() Hay dos errores: 1) Si ida_simple_get() falla, entonces este código llama a put_device(carrier) pero aún no hemos llamado a get_device( transportista) y probablemente eso conduzca a un uso posterior gratuito. 2) Después de device_initialize() entonces necesitamos usar put_device() para liberar el bus. Esto liberará los recursos internos vinculados al dispositivo y llamará a mcb_free_bus() que liberará el resto. • https://git.kernel.org/stable/c/5d9e2ab9fea4cdf0a2522f5cbed2e7fbb220d757 https://git.kernel.org/stable/c/8a558261fa57a6deefb0925ab1829f698b194aea https://git.kernel.org/stable/c/115b07d9f47e3996430b8f2007edd9768e1f807f https://git.kernel.org/stable/c/66f74ba9be9daf9c47fface6af3677f602774f6b https://git.kernel.org/stable/c/7751f609eadf36b1f53712bae430019c53a16eb0 https://git.kernel.org/stable/c/91e4ad05bf18322b5921d1a6c9b603f6eb1694f0 https://git.kernel.org/stable/c/9fc198f415dee070a1de957bb5bf5921d8df3499 https://git.kernel.org/stable/c/25a1433216489de4abc889910f744e952 •

CVSS: -EPSS: 0%CPEs: 2EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: cifs: Fix soft lockup during fsstress Below traces are observed during fsstress and system got hung. [ 130.698396] watchdog: BUG: soft lockup - CPU#6 stuck for 26s! En el kernel de Linux, se resolvió la siguiente vulnerabilidad: cifs: corrige el bloqueo suave durante fsstress. Los siguientes rastros se observan durante fsstress y el sistema se bloquea. [130.698396] perro guardián: BUG: bloqueo suave - ¡CPU#6 bloqueada durante 26 segundos! • https://git.kernel.org/stable/c/9f6c7aff21f81ae8856da1f63847d1362d523409 https://git.kernel.org/stable/c/71826b068884050d5fdd37fda857ba1539c513d3 •

CVSS: -EPSS: 0%CPEs: 7EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: staging: greybus: uart: fix tty use after free User space can hold a tty open indefinitely and tty drivers must not release the underlying structures until the last user is gone. Switch to using the tty-port reference counter to manage the life time of the greybus tty state to avoid use after free after a disconnect. En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: staging: greybus: uart: corrige el use after free de tty. El espacio de usuario puede mantener un tty abierto indefinidamente y los controladores de tty no deben liberar las estructuras subyacentes hasta que el último usuario se haya ido. Cambie al uso del contador de referencia del puerto tty para administrar la vida útil del estado tty de greybus para evitar su uso después de una desconexión. • https://git.kernel.org/stable/c/a18e15175708d39abbe9746ddc3479466b7800c3 https://git.kernel.org/stable/c/92b67aaafb7c449db9f0c3dcabc0ff967cb3a42d https://git.kernel.org/stable/c/64062fcaca8872f063ec9da011e7bf30470be33f https://git.kernel.org/stable/c/a5cfd51f6348e8fd7531461366946039c29c7e69 https://git.kernel.org/stable/c/4dc56951a8d9d61d364d346c61a5f1d70b4f5e14 https://git.kernel.org/stable/c/b9e697e60ce9890e9258a73eb061288e7d68e5e6 https://git.kernel.org/stable/c/9872ff6fdce8b229f01993b611b5d1719cb70ff1 https://git.kernel.org/stable/c/92dc0b1f46e12cfabd28d709bb34f7a39 •

CVSS: -EPSS: 0%CPEs: 9EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: atm: iphase: fix possible use-after-free in ia_module_exit() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself. En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: atm: iphase: corrige posible use after free en ia_module_exit(). La ruta de eliminación de este módulo llama a del_timer(). • https://git.kernel.org/stable/c/9e161687855175334ca93c6c3ccb221731194479 https://git.kernel.org/stable/c/a832ee2f2145f57443b2d565f8cb5490e8339f42 https://git.kernel.org/stable/c/bcdd2be48edd8c6867fb44112cb8d18086beae29 https://git.kernel.org/stable/c/89ce0b0747f319eb70f85bc820dcc43cebbd5417 https://git.kernel.org/stable/c/c9172498d4d62c9b64e5fb37c1ee0343e65fe51b https://git.kernel.org/stable/c/e759ff76ebbbfcdcf83b6634c54dc47828573d8b https://git.kernel.org/stable/c/b58d246a058ae88484758cd4ab27b3180fd5ecf8 https://git.kernel.org/stable/c/d1fb12412874c94ad037e11d0ecdd1140 •

CVSS: 7.7EPSS: 0%CPEs: 9EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: mISDN: fix possible use-after-free in HFC_cleanup() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself. En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mISDN: corrige posible use after free en HFC_cleanup(). La ruta de eliminación de este módulo llama a del_timer(). • https://git.kernel.org/stable/c/49331c07ef0f8fdfa42b30ba6a83a657b29d7fbe https://git.kernel.org/stable/c/54ff3202928952a100c477248e65ac6db01258a7 https://git.kernel.org/stable/c/7867ddc5f3de7f289aee63233afc0df4b62834c5 https://git.kernel.org/stable/c/5f2818185da0fe82a932f0856633038b66faf124 https://git.kernel.org/stable/c/3ecd228c636ee17c14662729737fa07242a93cb0 https://git.kernel.org/stable/c/b7ee9ae1e0cf55a037c4a99af2acc5d78cb7802d https://git.kernel.org/stable/c/61370ff07e0acc657559a8fac02551dfeb9d3020 https://git.kernel.org/stable/c/ed7c3739d0a07e2ec3ccbffe7e93cea01 • CWE-416: Use After Free •