Vulnerabilities > Linux

DATE CVE VULNERABILITY TITLE RISK
2024-05-21 CVE-2021-47355 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: atm: nicstar: Fix possible use-after-free in nicstar_cleanup() This module's remove path calls del_timer().
local
low complexity
linux CWE-416
7.8
2024-05-21 CVE-2021-47357 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: atm: iphase: fix possible use-after-free in ia_module_exit() This module's remove path calls del_timer().
local
low complexity
linux CWE-416
7.8
2024-05-21 CVE-2021-47358 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: staging: greybus: uart: fix tty use after free User space can hold a tty open indefinitely and tty drivers must not release the underlying structures until the last user is gone. Switch to using the tty-port reference counter to manage the life time of the greybus tty state to avoid use after free after a disconnect.
local
low complexity
linux CWE-416
7.8
2024-05-21 CVE-2021-47359 Improper Locking vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: cifs: Fix soft lockup during fsstress Below traces are observed during fsstress and system got hung. [ 130.698396] watchdog: BUG: soft lockup - CPU#6 stuck for 26s!
local
low complexity
linux CWE-667
5.5
2024-05-21 CVE-2021-47361 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: mcb: fix error handling in mcb_alloc_bus() There are two bugs: 1) If ida_simple_get() fails then this code calls put_device(carrier) but we haven't yet called get_device(carrier) and probably that leads to a use after free. 2) After device_initialize() then we need to use put_device() to release the bus.
local
low complexity
linux CWE-416
7.8
2024-05-21 CVE-2021-47362 NULL Pointer Dereference vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Update intermediate power state for SI Update the current state as boot state during dpm initialization. During the subsequent initialization, set_power_state gets called to transition to the final power state.
local
low complexity
linux CWE-476
5.5
2024-05-21 CVE-2021-47363 Divide By Zero vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: nexthop: Fix division by zero while replacing a resilient group The resilient nexthop group torture tests in fib_nexthop.sh exposed a possible division by zero while replacing a resilient group [1].
local
low complexity
linux CWE-369
5.5
2024-05-21 CVE-2021-47364 Memory Leak vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: comedi: Fix memory leak in compat_insnlist() `compat_insnlist()` handles the 32-bit version of the `COMEDI_INSNLIST` ioctl (whenwhen `CONFIG_COMPAT` is enabled).
local
low complexity
linux CWE-401
5.5
2024-05-21 CVE-2021-47372 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: net: macb: fix use after free on rmmod plat_dev->dev->platform_data is released by platform_device_unregister(), use of pclk and hclk is a use-after-free.
local
low complexity
linux CWE-416
7.8
2024-05-21 CVE-2021-47373 Off-by-one Error vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v3-its: Fix potential VPE leak on error In its_vpe_irq_domain_alloc, when its_vpe_init() returns an error, there is an off-by-one in the number of VPEs to be freed. Fix it by simply passing the number of VPEs allocated, which is the index of the loop iterating over the VPEs. [maz: fixed commit message]
local
low complexity
linux CWE-193
5.5