CVE-2021-47048

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
28/02/2024
Last modified:
09/12/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> spi: spi-zynqmp-gqspi: fix use-after-free in zynqmp_qspi_exec_op<br /> <br /> When handling op-&gt;addr, it is using the buffer "tmpbuf" which has been<br /> freed. This will trigger a use-after-free KASAN warning. Let&amp;#39;s use<br /> temporary variables to store op-&gt;addr.val and op-&gt;cmd.opcode to fix<br /> this issue.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.10 (including) 5.10.37 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.11.21 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.12 (including) 5.12.4 (excluding)