CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
In the Linux kernel, the following vulnerability has been resolved: i2c:
Fix a potential use after free Free the adap structure only after we are
done using it. This patch just moves the put_device() down a bit to avoid
the use after free. [wsa: added comment to the code, added Fixes tag]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < 5.4.0-132.148 | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-53.59 | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < 4.4.0-253.287 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1089.97 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1023.27 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-aws | < 4.4.0-1130.136 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws | < 4.4.0-1168.183 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < 5.15.0-1023.27~20.04.1 | UNKNOWN |
git.kernel.org/linus/e4c72c06c367758a14f227c847f9d623f1994ecf (6.0-rc1)
git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
launchpad.net/bugs/cve/CVE-2019-25162
nvd.nist.gov/vuln/detail/CVE-2019-25162
security-tracker.debian.org/tracker/CVE-2019-25162
ubuntu.com/security/notices/USN-6739-1
www.cve.org/CVERecord?id=CVE-2019-25162