{"id":"CVE-2021-47407","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: Handle SRCU initialization failure during page track init\n\nCheck the return of init_srcu_struct(), which can fail due to OOM, when\ninitializing the page track mechanism.  Lack of checking leads to a NULL\npointer deref found by a modified syzkaller.\n\n[Move the call towards the beginning of kvm_arch_init_vm. - Paolo]","modified":"2026-03-13T05:20:44.388602Z","published":"2024-05-21T15:15:26.247Z","related":["SUSE-SU-2024:2008-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2189-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2360-1","SUSE-SU-2024:2381-1","SUSE-SU-2024:2561-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/4664318f73e496cd22c71b10888e75434a123e23"},{"type":"FIX","url":"https://git.kernel.org/stable/c/deb2949417677649e2413266d7ce8c2ff73952b4"},{"type":"FIX","url":"https://git.kernel.org/stable/c/eb7511bf9182292ef1df1082d23039e856d1ddfb"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-47407.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"5.10.71"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.14.10"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc3"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}