In the Linux kernel, the following vulnerability has been resolved: misc/libmasm/module: Fix two use after free in ibmasm_init_one In ibmasm_init_one, it calls ibmasm_init_remote_input_dev(). Inside ibmasm_init_remote_input_dev, mouse_dev and keybd_dev are allocated by input_allocate_device(), and assigned to sp->remote.mouse_dev and sp->remote.keybd_dev respectively. In the err_free_devices error branch of ibmasm_init_one, mouse_dev and keybd_dev are freed by input_free_device(), and return error. Then the execution runs into error_send_message error branch of ibmasm_init_one, where ibmasm_free_remote_input_dev(sp) is called to unregister the freed sp->remote.mouse_dev and sp->remote.keybd_dev. My patch add a "error_init_remote" label to handle the error of ibmasm_init_remote_input_dev(), to avoid the uaf bugs.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-05-21T14:35:44.404Z

Updated: 2024-11-04T12:03:53.331Z

Reserved: 2024-05-21T14:28:16.977Z

Link: CVE-2021-47334

cve-icon Vulnrichment

Updated: 2024-05-23T19:01:25.472Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-21T15:15:20.273

Modified: 2024-05-21T16:54:26.047

Link: CVE-2021-47334

cve-icon Redhat

Severity : Low

Publid Date: 2024-05-21T00:00:00Z

Links: CVE-2021-47334 - Bugzilla