{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2021-47334","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-05-21T14:28:16.977Z","datePublished":"2024-05-21T14:35:44.404Z","dateUpdated":"2025-12-18T11:36:56.389Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-12-18T11:36:56.389Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmisc/libmasm/module: Fix two use after free in ibmasm_init_one\n\nIn ibmasm_init_one, it calls ibmasm_init_remote_input_dev().\nInside ibmasm_init_remote_input_dev, mouse_dev and keybd_dev are\nallocated by input_allocate_device(), and assigned to\nsp->remote.mouse_dev and sp->remote.keybd_dev respectively.\n\nIn the err_free_devices error branch of ibmasm_init_one,\nmouse_dev and keybd_dev are freed by input_free_device(), and return\nerror. Then the execution runs into error_send_message error branch\nof ibmasm_init_one, where ibmasm_free_remote_input_dev(sp) is called\nto unregister the freed sp->remote.mouse_dev and sp->remote.keybd_dev.\n\nMy patch add a \"error_init_remote\" label to handle the error of\nibmasm_init_remote_input_dev(), to avoid the uaf bugs."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/misc/ibmasm/module.c"],"versions":[{"version":"736ce43295682d060f2b93624b4a339f9af6aab1","lessThan":"1512e7dc5eb08b7d92a12e2bfcd9cb8c4a1ec069","status":"affected","versionType":"git"},{"version":"736ce43295682d060f2b93624b4a339f9af6aab1","lessThan":"29ba8e2ba89ee2862a26d91204dd5fe77ceee25a","status":"affected","versionType":"git"},{"version":"736ce43295682d060f2b93624b4a339f9af6aab1","lessThan":"5b06ca113bf197aab2ab61288f42506e0049fbab","status":"affected","versionType":"git"},{"version":"736ce43295682d060f2b93624b4a339f9af6aab1","lessThan":"481a76d4749ee3a27f902ba213fdcbb4bb39720e","status":"affected","versionType":"git"},{"version":"736ce43295682d060f2b93624b4a339f9af6aab1","lessThan":"38660031e80eaa6cc9370b031c180612f414b00d","status":"affected","versionType":"git"},{"version":"736ce43295682d060f2b93624b4a339f9af6aab1","lessThan":"b9c87ce3bc6331f82811a8cf8e930423c22523a3","status":"affected","versionType":"git"},{"version":"736ce43295682d060f2b93624b4a339f9af6aab1","lessThan":"ef1067d2baa847d53c9988510d99fb494de4d12c","status":"affected","versionType":"git"},{"version":"736ce43295682d060f2b93624b4a339f9af6aab1","lessThan":"a7268e8a227d5a4f0bd1584f556246b0224ab274","status":"affected","versionType":"git"},{"version":"736ce43295682d060f2b93624b4a339f9af6aab1","lessThan":"7272b591c4cb9327c43443f67b8fbae7657dd9ae","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/misc/ibmasm/module.c"],"versions":[{"version":"2.6.16","status":"affected"},{"version":"0","lessThan":"2.6.16","status":"unaffected","versionType":"semver"},{"version":"4.4.276","lessThanOrEqual":"4.4.*","status":"unaffected","versionType":"semver"},{"version":"4.9.276","lessThanOrEqual":"4.9.*","status":"unaffected","versionType":"semver"},{"version":"4.14.240","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.198","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.134","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.52","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.12.19","lessThanOrEqual":"5.12.*","status":"unaffected","versionType":"semver"},{"version":"5.13.4","lessThanOrEqual":"5.13.*","status":"unaffected","versionType":"semver"},{"version":"5.14","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.16","versionEndExcluding":"4.4.276"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.16","versionEndExcluding":"4.9.276"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.16","versionEndExcluding":"4.14.240"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.16","versionEndExcluding":"4.19.198"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.16","versionEndExcluding":"5.4.134"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.16","versionEndExcluding":"5.10.52"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.16","versionEndExcluding":"5.12.19"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.16","versionEndExcluding":"5.13.4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.16","versionEndExcluding":"5.14"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/1512e7dc5eb08b7d92a12e2bfcd9cb8c4a1ec069"},{"url":"https://git.kernel.org/stable/c/29ba8e2ba89ee2862a26d91204dd5fe77ceee25a"},{"url":"https://git.kernel.org/stable/c/5b06ca113bf197aab2ab61288f42506e0049fbab"},{"url":"https://git.kernel.org/stable/c/481a76d4749ee3a27f902ba213fdcbb4bb39720e"},{"url":"https://git.kernel.org/stable/c/38660031e80eaa6cc9370b031c180612f414b00d"},{"url":"https://git.kernel.org/stable/c/b9c87ce3bc6331f82811a8cf8e930423c22523a3"},{"url":"https://git.kernel.org/stable/c/ef1067d2baa847d53c9988510d99fb494de4d12c"},{"url":"https://git.kernel.org/stable/c/a7268e8a227d5a4f0bd1584f556246b0224ab274"},{"url":"https://git.kernel.org/stable/c/7272b591c4cb9327c43443f67b8fbae7657dd9ae"}],"title":"misc/libmasm/module: Fix two use after free in ibmasm_init_one","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2021-47334","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-05-21T18:44:43.256479Z"}}}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:15:19.912Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T05:32:08.622Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/1512e7dc5eb08b7d92a12e2bfcd9cb8c4a1ec069","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/29ba8e2ba89ee2862a26d91204dd5fe77ceee25a","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/5b06ca113bf197aab2ab61288f42506e0049fbab","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/481a76d4749ee3a27f902ba213fdcbb4bb39720e","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/38660031e80eaa6cc9370b031c180612f414b00d","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/b9c87ce3bc6331f82811a8cf8e930423c22523a3","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/ef1067d2baa847d53c9988510d99fb494de4d12c","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/a7268e8a227d5a4f0bd1584f556246b0224ab274","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/7272b591c4cb9327c43443f67b8fbae7657dd9ae","tags":["x_transferred"]}]}]}}