UVI-2021-1001217

See a problem?
Import Source
https://github.com/cloudsecurityalliance/gsd-database/blob/main/2021/1001xxx/UVI-2021-1001217.json
JSON Data
https://api.osv.dev/v1/vulns/UVI-2021-1001217
Published
2021-08-03T01:38:52.535228Z
Modified
2021-10-14T16:45:32.137380Z
Summary
KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio
Details

KVM: mmio: Fix use-after-free Read in kvmvmioctlunregistercoalesced_mmio

This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit 069d44a24c0ff8f85adf49233aae7a8ca16f5c7e, it was introduced in version v5.13 by commit 5d3c4c79384af06e3c8e25b7770b6247496b4417. For more details please see the references link.

References

Affected packages

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/
Events
Introduced
5d3c4c79384af06e3c8e25b7770b6247496b4417
Limit
069d44a24c0ff8f85adf49233aae7a8ca16f5c7e

Affected versions

v5.*

v5.12
v5.12-rc4
v5.12-rc5
v5.12-rc6
v5.12-rc7
v5.12-rc8
v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.13.1
v5.13.2
v5.13.3