In the Linux kernel, the following vulnerability has been resolved:
fs/mount_setattr: always cleanup mount_kattr
Make sure that finish_mount_kattr() is called after mount_kattr was
succesfully built in both the success and failure case to prevent
leaking any references we took when we built it. We returned early if
path lookup failed thereby risking to leak an additional reference we
took when building mount_kattr when an idmapped mount was requested.
References
Configurations
History
10 Apr 2024, 15:25
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-668 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
References | () https://git.kernel.org/stable/c/012e332286e2bb9f6ac77d195f17e74b2963d663 - Patch | |
References | () https://git.kernel.org/stable/c/47b5d0a7532d39e42a938f81e3904268145c341d - Patch | |
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
27 Feb 2024, 14:20
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
27 Feb 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-27 10:15
Updated : 2024-04-10 15:25
NVD link : CVE-2021-46923
Mitre link : CVE-2021-46923
CVE.ORG link : CVE-2021-46923
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-668
Exposure of Resource to Wrong Sphere