CVE-2021-47252

In the Linux kernel, the following vulnerability has been resolved: batman-adv: Avoid WARN_ON timing related checks The soft/batadv interface for a queued OGM can be changed during the time the OGM was queued for transmission and when the OGM is actually transmitted by the worker. But WARN_ON must be used to denote kernel bugs and not to print simple warnings. A warning can simply be printed using pr_warn.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*

History

30 Apr 2025, 15:12

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/282baa8104af44e04c4af3e7f933b44267c7f86f - () https://git.kernel.org/stable/c/282baa8104af44e04c4af3e7f933b44267c7f86f - Patch
References () https://git.kernel.org/stable/c/2eb4e0b3631832a4291c8bf4c9db873f60b128c8 - () https://git.kernel.org/stable/c/2eb4e0b3631832a4291c8bf4c9db873f60b128c8 - Patch
References () https://git.kernel.org/stable/c/45011f2973f6b52cf50db397bb27bf805f5f0e7f - () https://git.kernel.org/stable/c/45011f2973f6b52cf50db397bb27bf805f5f0e7f - Patch
References () https://git.kernel.org/stable/c/6031daaaf6d5c359c99dfffa102e332df234ff09 - () https://git.kernel.org/stable/c/6031daaaf6d5c359c99dfffa102e332df234ff09 - Patch
References () https://git.kernel.org/stable/c/77a99aad5bc3ea105806ebae6be3cbadc2fc615e - () https://git.kernel.org/stable/c/77a99aad5bc3ea105806ebae6be3cbadc2fc615e - Patch
References () https://git.kernel.org/stable/c/9f460ae31c4435fd022c443a6029352217a16ac1 - () https://git.kernel.org/stable/c/9f460ae31c4435fd022c443a6029352217a16ac1 - Patch
References () https://git.kernel.org/stable/c/e7fbd8184fa9e85f0d648c499841cb7ff6dec9f4 - () https://git.kernel.org/stable/c/e7fbd8184fa9e85f0d648c499841cb7ff6dec9f4 - Patch
References () https://git.kernel.org/stable/c/e8e9d2968a9d08bf5c683afca182f1537edebf8d - () https://git.kernel.org/stable/c/e8e9d2968a9d08bf5c683afca182f1537edebf8d - Patch

21 Nov 2024, 06:35

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: batman-adv: Evite comprobaciones relacionadas con el tiempo WARN_ON. La interfaz soft/batadv para un MDS en cola se puede cambiar durante el tiempo que el MDS estuvo en cola para transmisión y cuando el MDS realmente se transmite por el trabajador. Pero WARN_ON debe usarse para indicar errores del kernel y no para imprimir simples advertencias. Una advertencia se puede imprimir simplemente usando pr_warn.
References () https://git.kernel.org/stable/c/282baa8104af44e04c4af3e7f933b44267c7f86f - () https://git.kernel.org/stable/c/282baa8104af44e04c4af3e7f933b44267c7f86f -
References () https://git.kernel.org/stable/c/2eb4e0b3631832a4291c8bf4c9db873f60b128c8 - () https://git.kernel.org/stable/c/2eb4e0b3631832a4291c8bf4c9db873f60b128c8 -
References () https://git.kernel.org/stable/c/45011f2973f6b52cf50db397bb27bf805f5f0e7f - () https://git.kernel.org/stable/c/45011f2973f6b52cf50db397bb27bf805f5f0e7f -
References () https://git.kernel.org/stable/c/6031daaaf6d5c359c99dfffa102e332df234ff09 - () https://git.kernel.org/stable/c/6031daaaf6d5c359c99dfffa102e332df234ff09 -
References () https://git.kernel.org/stable/c/77a99aad5bc3ea105806ebae6be3cbadc2fc615e - () https://git.kernel.org/stable/c/77a99aad5bc3ea105806ebae6be3cbadc2fc615e -
References () https://git.kernel.org/stable/c/9f460ae31c4435fd022c443a6029352217a16ac1 - () https://git.kernel.org/stable/c/9f460ae31c4435fd022c443a6029352217a16ac1 -
References () https://git.kernel.org/stable/c/e7fbd8184fa9e85f0d648c499841cb7ff6dec9f4 - () https://git.kernel.org/stable/c/e7fbd8184fa9e85f0d648c499841cb7ff6dec9f4 -
References () https://git.kernel.org/stable/c/e8e9d2968a9d08bf5c683afca182f1537edebf8d - () https://git.kernel.org/stable/c/e8e9d2968a9d08bf5c683afca182f1537edebf8d -

21 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 15:15

Updated : 2025-04-30 15:12


NVD link : CVE-2021-47252

Mitre link : CVE-2021-47252

CVE.ORG link : CVE-2021-47252


JSON object : View

Products Affected

linux

  • linux_kernel