In the Linux kernel, the following vulnerability has been resolved:
NFS: Fix a potential NULL dereference in nfs_get_client()
None of the callers are expecting NULL returns from nfs_get_client() so
this code will lead to an Oops. It's better to return an error
pointer. I expect that this is dead code so hopefully no one is
affected.
References
Configurations
Configuration 1 (hide)
|
History
24 Dec 2024, 16:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/0057ecef9f324007c0ba5fcca4ddd131178ce78b - Patch | |
References | () https://git.kernel.org/stable/c/09226e8303beeec10f2ff844d2e46d1371dc58e0 - Patch | |
References | () https://git.kernel.org/stable/c/279ad78a00f8b9c5ff24171a59297187a3bd44b7 - Patch | |
References | () https://git.kernel.org/stable/c/4b380a7d84ef2ce3f4f5bec5d8706ed937ac6502 - Patch | |
References | () https://git.kernel.org/stable/c/58ddf61f10b8f9b7b1341644bfee2f1c6508d4e1 - Patch | |
References | () https://git.kernel.org/stable/c/634f17ff1d59905eb3b4bbbc00805961d08beaee - Patch | |
References | () https://git.kernel.org/stable/c/a979e601000982a3ca693171a6d4dffc47f8ad00 - Patch | |
References | () https://git.kernel.org/stable/c/fab8bfdfb4aac9e4e8363666333adfdf21e89106 - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
CWE | CWE-476 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Linux linux Kernel
Linux |
Information
Published : 2024-05-21 15:15
Updated : 2024-12-24 16:35
NVD link : CVE-2021-47260
Mitre link : CVE-2021-47260
CVE.ORG link : CVE-2021-47260
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference