CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
In the Linux kernel, the following vulnerability has been resolved:
i2c: Fix a potential use after free
Free the adap structure only after we are done using it.
This patch just moves the put_device() down a bit to avoid the
use after free.
[wsa: added comment to the code, added Fixes tag]
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | * | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4