CVE-2021-47470

In the Linux kernel, the following vulnerability has been resolved: mm, slub: fix potential use-after-free in slab_debugfs_fops When sysfs_slab_add failed, we shouldn't call debugfs_slab_add() for s because s will be freed soon. And slab_debugfs_fops will use s later leading to a use-after-free.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*

History

14 Jan 2025, 17:33

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416
CPE cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/159d8cfbd0428d487c53be4722f33cdab0d25d83 - () https://git.kernel.org/stable/c/159d8cfbd0428d487c53be4722f33cdab0d25d83 - Patch
References () https://git.kernel.org/stable/c/67823a544414def2a36c212abadb55b23bcda00c - () https://git.kernel.org/stable/c/67823a544414def2a36c212abadb55b23bcda00c - Patch

21 Nov 2024, 06:36

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: mm, slub: corrige el posible use-after-free en slab_debugfs_fops Cuando sysfs_slab_add falla, no debemos llamar a debugfs_slab_add() para s porque s se liberará pronto. Y slab_debugfs_fops usará s más tarde, lo que conducirá a un use-after-free.
References () https://git.kernel.org/stable/c/159d8cfbd0428d487c53be4722f33cdab0d25d83 - () https://git.kernel.org/stable/c/159d8cfbd0428d487c53be4722f33cdab0d25d83 -
References () https://git.kernel.org/stable/c/67823a544414def2a36c212abadb55b23bcda00c - () https://git.kernel.org/stable/c/67823a544414def2a36c212abadb55b23bcda00c -

22 May 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-22 07:15

Updated : 2025-01-14 17:33


NVD link : CVE-2021-47470

Mitre link : CVE-2021-47470

CVE.ORG link : CVE-2021-47470


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free