| { |
| "containers": { |
| "cna": { |
| "providerMetadata": { |
| "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038" |
| }, |
| "descriptions": [ |
| { |
| "lang": "en", |
| "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: Fix a potential use after free\n\nFree the adap structure only after we are done using it.\nThis patch just moves the put_device() down a bit to avoid the\nuse after free.\n\n[wsa: added comment to the code, added Fixes tag]" |
| } |
| ], |
| "affected": [ |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "unaffected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "drivers/i2c/i2c-core-base.c" |
| ], |
| "versions": [ |
| { |
| "version": "611e12ea0f121a31d9e9c4ce2a18a77abc2f28d6", |
| "lessThan": "e6412ba3b6508bdf9c074d310bf4144afa6aec1a", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "611e12ea0f121a31d9e9c4ce2a18a77abc2f28d6", |
| "lessThan": "23a191b132cd87f746c62f3dc27da33683d85829", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "611e12ea0f121a31d9e9c4ce2a18a77abc2f28d6", |
| "lessThan": "871a1e94929a27bf6e2cd99523865c840bbc2d87", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "611e12ea0f121a31d9e9c4ce2a18a77abc2f28d6", |
| "lessThan": "81cb31756888bb062e92d2dca21cd629d77a46a9", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "611e12ea0f121a31d9e9c4ce2a18a77abc2f28d6", |
| "lessThan": "35927d7509ab9bf41896b7e44f639504eae08af7", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "611e12ea0f121a31d9e9c4ce2a18a77abc2f28d6", |
| "lessThan": "e8e1a046cf87c8b1363e5de835114f2779e2aaf4", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "611e12ea0f121a31d9e9c4ce2a18a77abc2f28d6", |
| "lessThan": "12b0606000d0828630c033bf0c74c748464fe87d", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "611e12ea0f121a31d9e9c4ce2a18a77abc2f28d6", |
| "lessThan": "e4c72c06c367758a14f227c847f9d623f1994ecf", |
| "status": "affected", |
| "versionType": "git" |
| } |
| ] |
| }, |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "affected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "drivers/i2c/i2c-core-base.c" |
| ], |
| "versions": [ |
| { |
| "version": "4.3", |
| "status": "affected" |
| }, |
| { |
| "version": "0", |
| "lessThan": "4.3", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "4.14.291", |
| "lessThanOrEqual": "4.14.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "4.19.256", |
| "lessThanOrEqual": "4.19.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.4.211", |
| "lessThanOrEqual": "5.4.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.10.137", |
| "lessThanOrEqual": "5.10.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.15.61", |
| "lessThanOrEqual": "5.15.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.18.18", |
| "lessThanOrEqual": "5.18.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.19.2", |
| "lessThanOrEqual": "5.19.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.0", |
| "lessThanOrEqual": "*", |
| "status": "unaffected", |
| "versionType": "original_commit_for_fix" |
| } |
| ] |
| } |
| ], |
| "cpeApplicability": [ |
| { |
| "nodes": [ |
| { |
| "operator": "OR", |
| "negate": false, |
| "cpeMatch": [ |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.3", |
| "versionEndExcluding": "4.14.291" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.3", |
| "versionEndExcluding": "4.19.256" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.3", |
| "versionEndExcluding": "5.4.211" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.3", |
| "versionEndExcluding": "5.10.137" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.3", |
| "versionEndExcluding": "5.15.61" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.3", |
| "versionEndExcluding": "5.18.18" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.3", |
| "versionEndExcluding": "5.19.2" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.3", |
| "versionEndExcluding": "6.0" |
| } |
| ] |
| } |
| ] |
| } |
| ], |
| "references": [ |
| { |
| "url": "https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf" |
| } |
| ], |
| "title": "i2c: Fix a potential use after free", |
| "x_generator": { |
| "engine": "bippy-1.2.0" |
| } |
| } |
| }, |
| "cveMetadata": { |
| "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038", |
| "cveID": "CVE-2019-25162", |
| "requesterUserId": "gregkh@kernel.org", |
| "serial": "1", |
| "state": "PUBLISHED" |
| }, |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0" |
| } |