Skip to content

In the Linux kernel, the following vulnerability has been...

Unreviewed Published Mar 1, 2024 to the GitHub Advisory Database • Updated Mar 1, 2024

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

In the Linux kernel, the following vulnerability has been resolved:

KVM: Destroy I/O bus devices on unregister failure after sync'ing SRCU

If allocating a new instance of an I/O bus fails when unregistering a
device, wait to destroy the device until after all readers are guaranteed
to see the new null bus. Destroying devices before the bus is nullified
could lead to use-after-free since readers expect the devices on their
reference of the bus to remain valid.

References

Published by the National Vulnerability Database Feb 29, 2024
Published to the GitHub Advisory Database Mar 1, 2024
Last updated Mar 1, 2024

Severity

Unknown

EPSS score

0.045%
(16th percentile)

Weaknesses

No CWEs

CVE ID

CVE-2021-47061

GHSA ID

GHSA-wpx2-5m9q-j3g7

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.