CVE-2021-47407

In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Handle SRCU initialization failure during page track init Check the return of init_srcu_struct(), which can fail due to OOM, when initializing the page track mechanism. Lack of checking leads to a NULL pointer deref found by a modified syzkaller. [Move the call towards the beginning of kvm_arch_init_vm. - Paolo]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:36

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/eb7511bf9182292ef1df1082d23039e856d1ddfb - () https://git.kernel.org/stable/c/eb7511bf9182292ef1df1082d23039e856d1ddfb - Patch, Mailing List
References () https://git.kernel.org/stable/c/deb2949417677649e2413266d7ce8c2ff73952b4 - () https://git.kernel.org/stable/c/deb2949417677649e2413266d7ce8c2ff73952b4 - Patch, Mailing List
References () https://git.kernel.org/stable/c/4664318f73e496cd22c71b10888e75434a123e23 - () https://git.kernel.org/stable/c/4664318f73e496cd22c71b10888e75434a123e23 - Patch, Mailing List

21 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 15:15

Updated : 2024-11-21 06:36


NVD link : CVE-2021-47407

Mitre link : CVE-2021-47407


JSON object : View

Products Affected

linux

  • linux_kernel
CWE

No CWE.