In the Linux kernel, the following vulnerability has been resolved: xen-netback: take a reference to the RX task thread Do this in order to prevent the task from being freed if the thread returns (which can be triggered by the frontend) before the call to kthread_stop done as part of the backend tear down. Not taking the reference will lead to a use-after-free in that scenario. Such reference was taken before but dropped as part of the rework done in 2ac061ce97f4. Reintroduce the reference taking and add a comment this time explaining why it's needed. This is XSA-374 / CVE-2021-28691.
History

Mon, 04 Nov 2024 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-03-15T20:14:19.898Z

Updated: 2024-11-04T11:59:37.342Z

Reserved: 2024-03-04T18:12:48.836Z

Link: CVE-2021-47111

cve-icon Vulnrichment

Updated: 2024-08-04T05:24:39.854Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-15T21:15:06.577

Modified: 2024-03-17T22:38:29.433

Link: CVE-2021-47111

cve-icon Redhat

Severity : Low

Publid Date: 2024-03-15T00:00:00Z

Links: CVE-2021-47111 - Bugzilla