In the Linux kernel, the following vulnerability has been resolved:
xen-netback: take a reference to the RX task thread
Do this in order to prevent the task from being freed if the thread
returns (which can be triggered by the frontend) before the call to
kthread_stop done as part of the backend tear down. Not taking the
reference will lead to a use-after-free in that scenario. Such
reference was taken before but dropped as part of the rework done in
2ac061ce97f4.
Reintroduce the reference taking and add a comment this time
explaining why it's needed.
This is XSA-374 / CVE-2021-28691.
Metrics
Affected Vendors & Products
References
History
Mon, 04 Nov 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-03-15T20:14:19.898Z
Updated: 2024-11-04T11:59:37.342Z
Reserved: 2024-03-04T18:12:48.836Z
Link: CVE-2021-47111
Vulnrichment
Updated: 2024-08-04T05:24:39.854Z
NVD
Status : Awaiting Analysis
Published: 2024-03-15T21:15:06.577
Modified: 2024-03-17T22:38:29.433
Link: CVE-2021-47111
Redhat