Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: staging: greybus: uart: fix tty use after free User space can hold a tty open indefinitely and tty drivers must not release the underlying structures until the last user is gone. Switch to using the tty-port reference counter to manage the life time of the greybus tty state to avoid use after free after a disconnect.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.9, < 4.9.285 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/4dc56951a8d9d61d364d346c61a5f1d70b4f5e14Patch
- https://git.kernel.org/stable/c/64062fcaca8872f063ec9da011e7bf30470be33fPatch
- https://git.kernel.org/stable/c/92b67aaafb7c449db9f0c3dcabc0ff967cb3a42dPatch
- https://git.kernel.org/stable/c/92dc0b1f46e12cfabd28d709bb34f7a39431b44fPatch
- https://git.kernel.org/stable/c/9872ff6fdce8b229f01993b611b5d1719cb70ff1Patch
- https://git.kernel.org/stable/c/a5cfd51f6348e8fd7531461366946039c29c7e69Patch
- https://git.kernel.org/stable/c/b9e697e60ce9890e9258a73eb061288e7d68e5e6Patch
- https://git.kernel.org/stable/c/4dc56951a8d9d61d364d346c61a5f1d70b4f5e14Patch
- https://git.kernel.org/stable/c/64062fcaca8872f063ec9da011e7bf30470be33fPatch
- https://git.kernel.org/stable/c/92b67aaafb7c449db9f0c3dcabc0ff967cb3a42dPatch
- https://git.kernel.org/stable/c/92dc0b1f46e12cfabd28d709bb34f7a39431b44fPatch
- https://git.kernel.org/stable/c/9872ff6fdce8b229f01993b611b5d1719cb70ff1Patch
- https://git.kernel.org/stable/c/a5cfd51f6348e8fd7531461366946039c29c7e69Patch
- https://git.kernel.org/stable/c/b9e697e60ce9890e9258a73eb061288e7d68e5e6Patch
FAQ
What is CVE-2021-47358?
CVE-2021-47358 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: staging: greybus: uart: fix tty use after free User space can hold a tty open indefinitely and tty drivers must not release the un...
How severe is CVE-2021-47358?
CVE-2021-47358 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-47358?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.