CVE-2021-47111

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
15/03/2024
Last modified:
27/02/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> xen-netback: take a reference to the RX task thread<br /> <br /> Do this in order to prevent the task from being freed if the thread<br /> returns (which can be triggered by the frontend) before the call to<br /> kthread_stop done as part of the backend tear down. Not taking the<br /> reference will lead to a use-after-free in that scenario. Such<br /> reference was taken before but dropped as part of the rework done in<br /> 2ac061ce97f4.<br /> <br /> Reintroduce the reference taking and add a comment this time<br /> explaining why it&amp;#39;s needed.<br /> <br /> This is XSA-374 / CVE-2021-28691.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.43 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.12.10 (excluding)
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*