CVE-2021-47507

In the Linux kernel, the following vulnerability has been resolved: nfsd: Fix nsfd startup race (again) Commit bd5ae9288d64 ("nfsd: register pernet ops last, unregister first") has re-opened rpc_pipefs_event() race against nfsd_net_id registration (register_pernet_subsys()) which has been fixed by commit bb7ffbf29e76 ("nfsd: fix nsfd startup race triggering BUG_ON"). Restore the order of register_pernet_subsys() vs register_cld_notifier(). Add WARN_ON() to prevent a future regression. Crash info: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000012 CPU: 8 PID: 345 Comm: mount Not tainted 5.4.144-... #1 pc : rpc_pipefs_event+0x54/0x120 [nfsd] lr : rpc_pipefs_event+0x48/0x120 [nfsd] Call trace: rpc_pipefs_event+0x54/0x120 [nfsd] blocking_notifier_call_chain rpc_fill_super get_tree_keyed rpc_fs_get_tree vfs_get_tree do_mount ksys_mount __arm64_sys_mount el0_svc_handler el0_svc
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*

History

24 Sep 2025, 19:17

Type Values Removed Values Added
CWE CWE-362
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.7
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/8bf902fee5893cfc2f04a698abab47629699ae9a - () https://git.kernel.org/stable/c/8bf902fee5893cfc2f04a698abab47629699ae9a - Patch
References () https://git.kernel.org/stable/c/b10252c7ae9c9d7c90552f88b544a44ee773af64 - () https://git.kernel.org/stable/c/b10252c7ae9c9d7c90552f88b544a44ee773af64 - Patch
References () https://git.kernel.org/stable/c/c520943a00ad5015704969ad3304c956bcd49d25 - () https://git.kernel.org/stable/c/c520943a00ad5015704969ad3304c956bcd49d25 - Patch
References () https://git.kernel.org/stable/c/f5734b1714ca355703e9ea8fb61d04beff1790b9 - () https://git.kernel.org/stable/c/f5734b1714ca355703e9ea8fb61d04beff1790b9 - Patch

21 Nov 2024, 06:36

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfsd: corrige la ejecución de inicio de nsfd (nuevamente) El commit bd5ae9288d64 ("nfsd: registre las operaciones de pernet al final, anule el registro primero") ha reabierto la ejecución de rpc_pipefs_event() contra el registro de nfsd_net_id (register_pernet_subsys( )) que se ha solucionado mediante el commit bb7ffbf29e76 ("nfsd: arreglar la ejecución de inicio de nsfd que activa BUG_ON"). Restaure el orden de Register_pernet_subsys() frente a Register_cld_notifier(). Agregue WARN_ON() para evitar una regresión futura. Información de falla: no se puede manejar la desreferencia del puntero NULL del kernel en la dirección virtual 0000000000000012 CPU: 8 PID: 345 Comm: mount Not tainted 5.4.144-... #1 pc: rpc_pipefs_event+0x54/0x120 [nfsd] lr: rpc_pipefs_event+0x48/ 0x120 [nfsd] Rastreo de llamadas: rpc_pipefs_event+0x54/0x120 [nfsd] blocking_notifier_call_chain rpc_fill_super get_tree_keyed rpc_fs_get_tree vfs_get_tree do_mount ksys_mount __arm64_sys_mount el0_svc_handler el0_svc
References () https://git.kernel.org/stable/c/8bf902fee5893cfc2f04a698abab47629699ae9a - () https://git.kernel.org/stable/c/8bf902fee5893cfc2f04a698abab47629699ae9a -
References () https://git.kernel.org/stable/c/b10252c7ae9c9d7c90552f88b544a44ee773af64 - () https://git.kernel.org/stable/c/b10252c7ae9c9d7c90552f88b544a44ee773af64 -
References () https://git.kernel.org/stable/c/c520943a00ad5015704969ad3304c956bcd49d25 - () https://git.kernel.org/stable/c/c520943a00ad5015704969ad3304c956bcd49d25 -
References () https://git.kernel.org/stable/c/f5734b1714ca355703e9ea8fb61d04beff1790b9 - () https://git.kernel.org/stable/c/f5734b1714ca355703e9ea8fb61d04beff1790b9 -

24 May 2024, 18:09

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-24 15:15

Updated : 2025-09-24 19:17


NVD link : CVE-2021-47507

Mitre link : CVE-2021-47507

CVE.ORG link : CVE-2021-47507


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')