CVE-2021-47507

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-47507
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-47507.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-47507
Downstream
Related
Published
2024-05-24T15:15:11Z
Modified
2025-09-24T19:17:55Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

nfsd: Fix nsfd startup race (again)

Commit bd5ae9288d64 ("nfsd: register pernet ops last, unregister first") has re-opened rpcpipefsevent() race against nfsdnetid registration (registerpernetsubsys()) which has been fixed by commit bb7ffbf29e76 ("nfsd: fix nsfd startup race triggering BUG_ON").

Restore the order of registerpernetsubsys() vs registercldnotifier(). Add WARN_ON() to prevent a future regression.

Crash info: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000012 CPU: 8 PID: 345 Comm: mount Not tainted 5.4.144-... #1 pc : rpcpipefsevent+0x54/0x120 [nfsd] lr : rpcpipefsevent+0x48/0x120 [nfsd] Call trace: rpcpipefsevent+0x54/0x120 [nfsd] blockingnotifiercallchain rpcfillsuper gettreekeyed rpcfsgettree vfsgettree domount ksysmount _arm64sysmount el0svchandler el0svc

References

Affected packages