CVE-2021-47600

In the Linux kernel, the following vulnerability has been resolved: dm btree remove: fix use after free in rebalance_children() Move dm_tm_unlock() after dm_tm_dec().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:36

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0e21e6cd5eebfc929ac5fa3b97ca2d4ace3cb6a3 - Patch () https://git.kernel.org/stable/c/0e21e6cd5eebfc929ac5fa3b97ca2d4ace3cb6a3 - Patch
References () https://git.kernel.org/stable/c/1b8d2789dad0005fd5e7d35dab26a8e1203fb6da - Patch () https://git.kernel.org/stable/c/1b8d2789dad0005fd5e7d35dab26a8e1203fb6da - Patch
References () https://git.kernel.org/stable/c/293f957be5e39720778fb1851ced7f5fba6d51c3 - Patch () https://git.kernel.org/stable/c/293f957be5e39720778fb1851ced7f5fba6d51c3 - Patch
References () https://git.kernel.org/stable/c/501ecd90efdc9b2edc6c28852ecd098a4adf8f00 - Patch () https://git.kernel.org/stable/c/501ecd90efdc9b2edc6c28852ecd098a4adf8f00 - Patch
References () https://git.kernel.org/stable/c/607beb420b3fe23b948a9bf447d993521a02fbbb - Patch () https://git.kernel.org/stable/c/607beb420b3fe23b948a9bf447d993521a02fbbb - Patch
References () https://git.kernel.org/stable/c/66ea642af6fd4eacb5d0271a922130fcf8700424 - Patch () https://git.kernel.org/stable/c/66ea642af6fd4eacb5d0271a922130fcf8700424 - Patch
References () https://git.kernel.org/stable/c/a48f6a2bf33734ec5669ee03067dfb6c5b4818d6 - Patch () https://git.kernel.org/stable/c/a48f6a2bf33734ec5669ee03067dfb6c5b4818d6 - Patch
References () https://git.kernel.org/stable/c/b03abd0aa09c05099f537cb05b8460c4298f0861 - Patch () https://git.kernel.org/stable/c/b03abd0aa09c05099f537cb05b8460c4298f0861 - Patch

27 Aug 2024, 16:14

Type Values Removed Values Added
CWE CWE-416
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0e21e6cd5eebfc929ac5fa3b97ca2d4ace3cb6a3 - () https://git.kernel.org/stable/c/0e21e6cd5eebfc929ac5fa3b97ca2d4ace3cb6a3 - Patch
References () https://git.kernel.org/stable/c/1b8d2789dad0005fd5e7d35dab26a8e1203fb6da - () https://git.kernel.org/stable/c/1b8d2789dad0005fd5e7d35dab26a8e1203fb6da - Patch
References () https://git.kernel.org/stable/c/293f957be5e39720778fb1851ced7f5fba6d51c3 - () https://git.kernel.org/stable/c/293f957be5e39720778fb1851ced7f5fba6d51c3 - Patch
References () https://git.kernel.org/stable/c/501ecd90efdc9b2edc6c28852ecd098a4adf8f00 - () https://git.kernel.org/stable/c/501ecd90efdc9b2edc6c28852ecd098a4adf8f00 - Patch
References () https://git.kernel.org/stable/c/607beb420b3fe23b948a9bf447d993521a02fbbb - () https://git.kernel.org/stable/c/607beb420b3fe23b948a9bf447d993521a02fbbb - Patch
References () https://git.kernel.org/stable/c/66ea642af6fd4eacb5d0271a922130fcf8700424 - () https://git.kernel.org/stable/c/66ea642af6fd4eacb5d0271a922130fcf8700424 - Patch
References () https://git.kernel.org/stable/c/a48f6a2bf33734ec5669ee03067dfb6c5b4818d6 - () https://git.kernel.org/stable/c/a48f6a2bf33734ec5669ee03067dfb6c5b4818d6 - Patch
References () https://git.kernel.org/stable/c/b03abd0aa09c05099f537cb05b8460c4298f0861 - () https://git.kernel.org/stable/c/b03abd0aa09c05099f537cb05b8460c4298f0861 - Patch

20 Jun 2024, 12:43

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dm btree remove: corrige el use after free en rebalance_children() Mueve dm_tm_unlock() después de dm_tm_dec().

19 Jun 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-19 15:15

Updated : 2024-11-21 06:36


NVD link : CVE-2021-47600

Mitre link : CVE-2021-47600

CVE.ORG link : CVE-2021-47600


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free