First published: Fri Mar 15 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: xen-netback: take a reference to the RX task thread Do this in order to prevent the task from being freed if the thread returns (which can be triggered by the frontend) before the call to kthread_stop done as part of the backend tear down. Not taking the reference will lead to a use-after-free in that scenario. Such reference was taken before but dropped as part of the rework done in 2ac061ce97f4. Reintroduce the reference taking and add a comment this time explaining why it's needed. This is XSA-374 / CVE-2021-28691.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel | >2ac061ce97f4 | |
Linux Kernel | >=5.5<5.10.43 | |
Linux Kernel | >=5.11<5.12.10 | |
Linux Kernel | =5.13-rc1 | |
Linux Kernel | =5.13-rc2 | |
Linux Kernel | =5.13-rc3 | |
Linux Kernel | =5.13-rc4 | |
Linux Kernel | =5.13-rc5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-47111 is classified as medium, indicating a moderate risk to affected systems.
To fix CVE-2021-47111, you should update the Linux kernel to the latest stable version that addresses the vulnerability.
CVE-2021-47111 affects Linux kernel versions between 5.5 and 5.10.43, as well as 5.11 to 5.12.10, and specific release candidates for 5.13.
CVE-2021-47111 can potentially allow a denial of service by causing a task thread to be improperly freed.
CVE-2021-47111 is not considered remotely exploitable as it requires local access to trigger the vulnerability.