CVE-2021-47616

In the Linux kernel, the following vulnerability has been resolved: RDMA: Fix use-after-free in rxe_queue_cleanup On error handling path in rxe_qp_from_init() qp->sq.queue is freed and then rxe_create_qp() will drop last reference to this object. qp clean up function will try to free this queue one time and it causes UAF bug. Fix it by zeroing queue pointer after freeing queue in rxe_qp_from_init().
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

27 Aug 2024, 16:13

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/acb53e47db1fbc7cd37ab10b46388f045a76e383 - () https://git.kernel.org/stable/c/acb53e47db1fbc7cd37ab10b46388f045a76e383 - Patch
References () https://git.kernel.org/stable/c/84b01721e8042cdd1e8ffeb648844a09cd4213e0 - () https://git.kernel.org/stable/c/84b01721e8042cdd1e8ffeb648844a09cd4213e0 - Patch
CWE CWE-416

19 Jun 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-19 15:15

Updated : 2024-08-27 16:13


NVD link : CVE-2021-47616

Mitre link : CVE-2021-47616


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free