CVE-2021-47111

In the Linux kernel, the following vulnerability has been resolved: xen-netback: take a reference to the RX task thread Do this in order to prevent the task from being freed if the thread returns (which can be triggered by the frontend) before the call to kthread_stop done as part of the backend tear down. Not taking the reference will lead to a use-after-free in that scenario. Such reference was taken before but dropped as part of the rework done in 2ac061ce97f4. Reintroduce the reference taking and add a comment this time explaining why it's needed. This is XSA-374 / CVE-2021-28691.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*

History

27 Feb 2025, 03:20

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/107866a8eb0b664675a260f1ba0655010fac1e08 - () https://git.kernel.org/stable/c/107866a8eb0b664675a260f1ba0655010fac1e08 - Patch
References () https://git.kernel.org/stable/c/6b53db8c4c14b4e7256f058d202908b54a7b85b4 - () https://git.kernel.org/stable/c/6b53db8c4c14b4e7256f058d202908b54a7b85b4 - Patch
References () https://git.kernel.org/stable/c/caec9bcaeb1a5f03f2d406305355c853af10c13e - () https://git.kernel.org/stable/c/caec9bcaeb1a5f03f2d406305355c853af10c13e - Patch
CPE cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
CWE CWE-416

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/107866a8eb0b664675a260f1ba0655010fac1e08 - () https://git.kernel.org/stable/c/107866a8eb0b664675a260f1ba0655010fac1e08 -
References () https://git.kernel.org/stable/c/6b53db8c4c14b4e7256f058d202908b54a7b85b4 - () https://git.kernel.org/stable/c/6b53db8c4c14b4e7256f058d202908b54a7b85b4 -
References () https://git.kernel.org/stable/c/caec9bcaeb1a5f03f2d406305355c853af10c13e - () https://git.kernel.org/stable/c/caec9bcaeb1a5f03f2d406305355c853af10c13e -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: xen-netback: toma una referencia al hilo de la tarea RX. Haga esto para evitar que la tarea se libere si el hilo regresa (que puede ser activado por el frontend) antes de que llamada a kthread_stop realizada como parte del desmontaje del backend. No tomar la referencia conducirá a un use-after-free en ese escenario. Esta referencia se tomó antes, pero se eliminó como parte de la revisión realizada en 2ac061ce97f4. Vuelva a introducir la toma de referencia y agregue esta vez un comentario explicando por qué es necesario. Este es XSA-374/CVE-2021-28691.

15 Mar 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-15 21:15

Updated : 2025-02-27 03:20


NVD link : CVE-2021-47111

Mitre link : CVE-2021-47111

CVE.ORG link : CVE-2021-47111


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free