Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2021-46959
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-29 Feb, 2024 | 22:31
Updated At-04 May, 2025 | 12:40
Rejected At-
▼CVE Numbering Authority (CNA)
spi: Fix use-after-free with devm_spi_alloc_*

In the Linux kernel, the following vulnerability has been resolved: spi: Fix use-after-free with devm_spi_alloc_* We can't rely on the contents of the devres list during spi_unregister_controller(), as the list is already torn down at the time we perform devres_find() for devm_spi_release_controller. This causes devices registered with devm_spi_alloc_{master,slave}() to be mistakenly identified as legacy, non-devm managed devices and have their reference counters decremented below 0. ------------[ cut here ]------------ WARNING: CPU: 1 PID: 660 at lib/refcount.c:28 refcount_warn_saturate+0x108/0x174 [<b0396f04>] (refcount_warn_saturate) from [<b03c56a4>] (kobject_put+0x90/0x98) [<b03c5614>] (kobject_put) from [<b0447b4c>] (put_device+0x20/0x24) r4:b6700140 [<b0447b2c>] (put_device) from [<b07515e8>] (devm_spi_release_controller+0x3c/0x40) [<b07515ac>] (devm_spi_release_controller) from [<b045343c>] (release_nodes+0x84/0xc4) r5:b6700180 r4:b6700100 [<b04533b8>] (release_nodes) from [<b0454160>] (devres_release_all+0x5c/0x60) r8:b1638c54 r7:b117ad94 r6:b1638c10 r5:b117ad94 r4:b163dc10 [<b0454104>] (devres_release_all) from [<b044e41c>] (__device_release_driver+0x144/0x1ec) r5:b117ad94 r4:b163dc10 [<b044e2d8>] (__device_release_driver) from [<b044f70c>] (device_driver_detach+0x84/0xa0) r9:00000000 r8:00000000 r7:b117ad94 r6:b163dc54 r5:b1638c10 r4:b163dc10 [<b044f688>] (device_driver_detach) from [<b044d274>] (unbind_store+0xe4/0xf8) Instead, determine the devm allocation state as a flag on the controller which is guaranteed to be stable during cleanup.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/spi/spi.c
  • include/linux/spi/spi.h
Default Status
unaffected
Versions
Affected
  • From a4add022c1552b0d51a0b89a4781919d6ebac4f9 before 62bb2c7f2411a0045c24831f11ecacfc35610815 (git)
  • From 0870525cf94bc27907e94ce99afb6d7239ffd2f5 before 8bf96425c90f5c1dcf3b7b9df568019a1d4b8a0e (git)
  • From 8c45a1c6c951bbe7f95db78fcab46f7337364468 before 8e029707f50a82c53172359c686b2536ab54e58c (git)
  • From 234b432c7b6184b2d6c5ba2c55f0dd5023c0edf0 before 28a5529068c51cdf0295ab1e11a99a3a909a03e4 (git)
  • From 3e04a4976addbedcad326f47b0dd4efc570a1fac before 001c8e83646ad3b847b18f6ac55a54367d917d74 (git)
  • From 5e844cc37a5cbaa460e68f9a989d321d63088a89 before c7fabe372a9031acd00498bc718ce27c253abfd1 (git)
  • From 5e844cc37a5cbaa460e68f9a989d321d63088a89 before cee78aa24578edac8cf00513dca618c0acc17cd7 (git)
  • From 5e844cc37a5cbaa460e68f9a989d321d63088a89 before 8735248ebb918d25427965f0db07939ed0473ec6 (git)
  • From 5e844cc37a5cbaa460e68f9a989d321d63088a89 before 794aaf01444d4e765e2b067cba01cc69c1c68ed9 (git)
  • bd1a5b2307279029faaddbecf2f2ac25eaef8dc6 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/spi/spi.c
  • include/linux/spi/spi.h
Default Status
affected
Versions
Affected
  • 5.10
Unaffected
  • From 0 before 5.10 (semver)
  • From 4.4.271 through 4.4.* (semver)
  • From 4.9.271 through 4.9.* (semver)
  • From 4.14.233 through 4.14.* (semver)
  • From 4.19.191 through 4.19.* (semver)
  • From 5.4.119 through 5.4.* (semver)
  • From 5.10.37 through 5.10.* (semver)
  • From 5.11.21 through 5.11.* (semver)
  • From 5.12.4 through 5.12.* (semver)
  • From 5.13 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/62bb2c7f2411a0045c24831f11ecacfc35610815
N/A
https://git.kernel.org/stable/c/8bf96425c90f5c1dcf3b7b9df568019a1d4b8a0e
N/A
https://git.kernel.org/stable/c/8e029707f50a82c53172359c686b2536ab54e58c
N/A
https://git.kernel.org/stable/c/28a5529068c51cdf0295ab1e11a99a3a909a03e4
N/A
https://git.kernel.org/stable/c/001c8e83646ad3b847b18f6ac55a54367d917d74
N/A
https://git.kernel.org/stable/c/c7fabe372a9031acd00498bc718ce27c253abfd1
N/A
https://git.kernel.org/stable/c/cee78aa24578edac8cf00513dca618c0acc17cd7
N/A
https://git.kernel.org/stable/c/8735248ebb918d25427965f0db07939ed0473ec6
N/A
https://git.kernel.org/stable/c/794aaf01444d4e765e2b067cba01cc69c1c68ed9
N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/62bb2c7f2411a0045c24831f11ecacfc35610815
x_transferred
https://git.kernel.org/stable/c/8bf96425c90f5c1dcf3b7b9df568019a1d4b8a0e
x_transferred
https://git.kernel.org/stable/c/8e029707f50a82c53172359c686b2536ab54e58c
x_transferred
https://git.kernel.org/stable/c/28a5529068c51cdf0295ab1e11a99a3a909a03e4
x_transferred
https://git.kernel.org/stable/c/001c8e83646ad3b847b18f6ac55a54367d917d74
x_transferred
https://git.kernel.org/stable/c/c7fabe372a9031acd00498bc718ce27c253abfd1
x_transferred
https://git.kernel.org/stable/c/cee78aa24578edac8cf00513dca618c0acc17cd7
x_transferred
https://git.kernel.org/stable/c/8735248ebb918d25427965f0db07939ed0473ec6
x_transferred
https://git.kernel.org/stable/c/794aaf01444d4e765e2b067cba01cc69c1c68ed9
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found