{"id":"CVE-2021-47123","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: fix ltout double free on completion race\n\nAlways remove linked timeout on io_link_timeout_fn() from the master\nrequest link list, otherwise we may get use-after-free when first\nio_link_timeout_fn() puts linked timeout in the fail path, and then\nwill be found and put on master's free.","modified":"2026-05-04T08:38:52.701387Z","published":"2024-03-15T21:15:07.217Z","withdrawn":"2026-05-04T08:38:52.701387Z","references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/1f64f5e903b9d1d157875721e02adadc9d6f0a5d"},{"type":"FIX","url":"https://git.kernel.org/stable/c/447c19f3b5074409c794b350b10306e1da1ef4ba"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"5.11"},{"fixed":"5.12.10"}]},{"events":[{"introduced":"0"},{"last_affected":"5.13-rc1"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47123.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}