ghsa-rh38-52q8-4ffc
Vulnerability from github
Published
2024-04-10 21:30
Modified
2024-04-10 21:30
Details
In the Linux kernel, the following vulnerability has been resolved:
usb: host: ohci-tmio: check return value after calling platform_get_resource()
It will cause null-ptr-deref if platform_get_resource() returns NULL, we need check the return value.
{ "affected": [], "aliases": [ "CVE-2021-47206" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-04-10T19:15:48Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: ohci-tmio: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value.", "id": "GHSA-rh38-52q8-4ffc", "modified": "2024-04-10T21:30:31Z", "published": "2024-04-10T21:30:31Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47206" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/065334f6640d074a1caec2f8b0091467a22f9483" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/2474eb7fc3bfbce10f7b8ea431fcffe5dd5f5100" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/28e016e02118917e50a667bc72fb80098cf2b460" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/2f18f97a1a787154a372c0738f1576f14b693d91" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/951b8239fd24678b56c995c5c0456ab12e059d19" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/9eff2b2e59fda25051ab36cd1cb5014661df657b" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/bb6ed2e05eb6e8619b30fa854f9becd50c11723f" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/f98986b7acb4219f95789095eced93ed69d81d35" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.