CVE-2021-47296

In the Linux kernel, the following vulnerability has been resolved: KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak vcpu_put is not called if the user copy fails. This can result in preempt notifier corruption and crashes, among other issues.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*

History

23 Jun 2025, 20:19

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-401
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/9bafc34dc4ad0cef18727c557f21ed3c3304df50 - () https://git.kernel.org/stable/c/9bafc34dc4ad0cef18727c557f21ed3c3304df50 - Patch
References () https://git.kernel.org/stable/c/a4a488915feaad38345cc01b80d52e8200ff5209 - () https://git.kernel.org/stable/c/a4a488915feaad38345cc01b80d52e8200ff5209 - Patch
References () https://git.kernel.org/stable/c/bc4188a2f56e821ea057aca6bf444e138d06c252 - () https://git.kernel.org/stable/c/bc4188a2f56e821ea057aca6bf444e138d06c252 - Patch
References () https://git.kernel.org/stable/c/e14ef1095387f764d95614d3ec9e4d07c82a3533 - () https://git.kernel.org/stable/c/e14ef1095387f764d95614d3ec9e4d07c82a3533 - Patch
References () https://git.kernel.org/stable/c/f38527f1890543cdfca8dfd06f75f9887cce6151 - () https://git.kernel.org/stable/c/f38527f1890543cdfca8dfd06f75f9887cce6151 - Patch
First Time Linux
Linux linux Kernel
CWE CWE-401
References () https://git.kernel.org/stable/c/9bafc34dc4ad0cef18727c557f21ed3c3304df50 - () https://git.kernel.org/stable/c/9bafc34dc4ad0cef18727c557f21ed3c3304df50 - Patch
References () https://git.kernel.org/stable/c/a4a488915feaad38345cc01b80d52e8200ff5209 - () https://git.kernel.org/stable/c/a4a488915feaad38345cc01b80d52e8200ff5209 - Patch
References () https://git.kernel.org/stable/c/bc4188a2f56e821ea057aca6bf444e138d06c252 - () https://git.kernel.org/stable/c/bc4188a2f56e821ea057aca6bf444e138d06c252 - Patch
References () https://git.kernel.org/stable/c/e14ef1095387f764d95614d3ec9e4d07c82a3533 - () https://git.kernel.org/stable/c/e14ef1095387f764d95614d3ec9e4d07c82a3533 - Patch
References () https://git.kernel.org/stable/c/f38527f1890543cdfca8dfd06f75f9887cce6151 - () https://git.kernel.org/stable/c/f38527f1890543cdfca8dfd06f75f9887cce6151 - Patch

21 Nov 2024, 06:35

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/9bafc34dc4ad0cef18727c557f21ed3c3304df50 - Patch () https://git.kernel.org/stable/c/9bafc34dc4ad0cef18727c557f21ed3c3304df50 -
References () https://git.kernel.org/stable/c/a4a488915feaad38345cc01b80d52e8200ff5209 - Patch () https://git.kernel.org/stable/c/a4a488915feaad38345cc01b80d52e8200ff5209 -
References () https://git.kernel.org/stable/c/bc4188a2f56e821ea057aca6bf444e138d06c252 - Patch () https://git.kernel.org/stable/c/bc4188a2f56e821ea057aca6bf444e138d06c252 -
References () https://git.kernel.org/stable/c/e14ef1095387f764d95614d3ec9e4d07c82a3533 - Patch () https://git.kernel.org/stable/c/e14ef1095387f764d95614d3ec9e4d07c82a3533 -
References () https://git.kernel.org/stable/c/f38527f1890543cdfca8dfd06f75f9887cce6151 - Patch () https://git.kernel.org/stable/c/f38527f1890543cdfca8dfd06f75f9887cce6151 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: PPC: corrección de fuga de kvm_arch_vcpu_ioctl vcpu_load. No se llama a vcpu_put si falla la copia del usuario. Esto puede provocar daños y bloqueos del notificador preventivo, entre otros problemas.
References () https://git.kernel.org/stable/c/9bafc34dc4ad0cef18727c557f21ed3c3304df50 - () https://git.kernel.org/stable/c/9bafc34dc4ad0cef18727c557f21ed3c3304df50 -
References () https://git.kernel.org/stable/c/a4a488915feaad38345cc01b80d52e8200ff5209 - () https://git.kernel.org/stable/c/a4a488915feaad38345cc01b80d52e8200ff5209 -
References () https://git.kernel.org/stable/c/bc4188a2f56e821ea057aca6bf444e138d06c252 - () https://git.kernel.org/stable/c/bc4188a2f56e821ea057aca6bf444e138d06c252 -
References () https://git.kernel.org/stable/c/e14ef1095387f764d95614d3ec9e4d07c82a3533 - () https://git.kernel.org/stable/c/e14ef1095387f764d95614d3ec9e4d07c82a3533 -
References () https://git.kernel.org/stable/c/f38527f1890543cdfca8dfd06f75f9887cce6151 - () https://git.kernel.org/stable/c/f38527f1890543cdfca8dfd06f75f9887cce6151 -
CVSS v2 : unknown
v3 : 5.5
v2 : unknown
v3 : unknown
CWE CWE-401

21 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 15:15

Updated : 2025-06-23 20:19


NVD link : CVE-2021-47296

Mitre link : CVE-2021-47296

CVE.ORG link : CVE-2021-47296


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime