CVE-2021-47111

In the Linux kernel, the following vulnerability has been resolved: xen-netback: take a reference to the RX task thread Do this in order to prevent the task from being freed if the thread returns (which can be triggered by the frontend) before the call to kthread_stop done as part of the backend tear down. Not taking the reference will lead to a use-after-free in that scenario. Such reference was taken before but dropped as part of the rework done in 2ac061ce97f4. Reintroduce the reference taking and add a comment this time explaining why it's needed. This is XSA-374 / CVE-2021-28691.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*

History

27 Feb 2025, 03:20

Type Values Removed Values Added
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/107866a8eb0b664675a260f1ba0655010fac1e08 - () https://git.kernel.org/stable/c/107866a8eb0b664675a260f1ba0655010fac1e08 - Patch
References () https://git.kernel.org/stable/c/6b53db8c4c14b4e7256f058d202908b54a7b85b4 - () https://git.kernel.org/stable/c/6b53db8c4c14b4e7256f058d202908b54a7b85b4 - Patch
References () https://git.kernel.org/stable/c/caec9bcaeb1a5f03f2d406305355c853af10c13e - () https://git.kernel.org/stable/c/caec9bcaeb1a5f03f2d406305355c853af10c13e - Patch
CPE cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/107866a8eb0b664675a260f1ba0655010fac1e08 - () https://git.kernel.org/stable/c/107866a8eb0b664675a260f1ba0655010fac1e08 -
References () https://git.kernel.org/stable/c/6b53db8c4c14b4e7256f058d202908b54a7b85b4 - () https://git.kernel.org/stable/c/6b53db8c4c14b4e7256f058d202908b54a7b85b4 -
References () https://git.kernel.org/stable/c/caec9bcaeb1a5f03f2d406305355c853af10c13e - () https://git.kernel.org/stable/c/caec9bcaeb1a5f03f2d406305355c853af10c13e -

15 Mar 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-15 21:15

Updated : 2025-02-27 03:20


NVD link : CVE-2021-47111

Mitre link : CVE-2021-47111

CVE.ORG link : CVE-2021-47111


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free