![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2021-47082 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
tun: avoid double free in tun_free_netdev Avoid double free in
tun_free_netdev() by moving the dev->tstats and tun->security allocs
to a new ndo_init routine (tun_net_init()) that will be called by
register_netdevice(). ndo_init is paired with the desctructor
(tun_free_netdev()), so if there's an error in register_netdevice()
the destructor will handle the frees. BUG: KASAN: double-free or
invalid-free in selinux_tun_dev_free_security+0x1a/0x20
security/selinux/hooks.c:5605 CPU: 0 PID: 25750 Comm: syz-executor416
Not tainted 5.16.0-rc2-syzk #1 Hardware name: Red Hat KVM, BIOS Call
Trace: |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2021-47082 https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681 https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681 https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5 https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5 https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757 https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757 https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904 https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904 |