In the Linux kernel, the following vulnerability has been resolved:
io_uring: fix ltout double free on completion race
Always remove linked timeout on io_link_timeout_fn() from the master
request link list, otherwise we may get use-after-free when first
io_link_timeout_fn() puts linked timeout in the fail path, and then
will be found and put on master's free.
References
Configurations
Configuration 1 (hide)
|
History
14 Jan 2025, 15:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/1f64f5e903b9d1d157875721e02adadc9d6f0a5d - Patch | |
References | () https://git.kernel.org/stable/c/447c19f3b5074409c794b350b10306e1da1ef4ba - Patch | |
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* |
|
CWE | CWE-416 CWE-415 |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
Information
Published : 2024-03-15 21:15
Updated : 2025-01-14 15:02
NVD link : CVE-2021-47123
Mitre link : CVE-2021-47123
CVE.ORG link : CVE-2021-47123
JSON object : View
Products Affected
linux
- linux_kernel