CVE-2021-46969
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
27/02/2024
Last modified:
08/01/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bus: mhi: core: Fix invalid error returning in mhi_queue<br />
<br />
mhi_queue returns an error when the doorbell is not accessible in<br />
the current state. This can happen when the device is in non M0<br />
state, like M3, and needs to be waken-up prior ringing the DB. This<br />
case is managed earlier by triggering an asynchronous M3 exit via<br />
controller resume/suspend callbacks, that in turn will cause M0<br />
transition and DB update.<br />
<br />
So, since it&#39;s not an error but just delaying of doorbell update, there<br />
is no reason to return an error.<br />
<br />
This also fixes a use after free error for skb case, indeed a caller<br />
queuing skb will try to free the skb if the queueing fails, but in<br />
that case queueing has been done.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.12 (including) | 5.12.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



