First published: Wed Feb 28 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: Drivers: hv: vmbus: Use after free in __vmbus_open() The "open_info" variable is added to the &vmbus_connection.chn_msg_list, but the error handling frees "open_info" without removing it from the list. This will result in a use after free. First remove it from the list, and then free it.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=4.14<5.10.37 | |
Linux Kernel | >=5.11<5.11.21 | |
Linux Kernel | >=5.12<5.12.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47049 has been classified as a high-severity vulnerability due to its potential impact on system stability and security.
To fix CVE-2021-47049, update your Linux kernel to a version that exceeds 5.12.4, 5.11.21, or 5.10.37.
The impact of CVE-2021-47049 includes potential exploitation leading to system crashes and possible remote code execution.
CVE-2021-47049 affects Linux kernel versions between 4.14 and 5.10.37, as well as versions from 5.11 to 5.11.21, and 5.12 up to 5.12.4.
CVE-2021-47049 involves the drivers for Hyper-V, particularly affecting the vmbus component during the vmbus_open() process.