{"vulnerability": "CVE-2021-47254", "sightings": [{"uuid": "93a74592-5498-4660-927c-fc17ebb70a42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2021-47254", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0397/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}, {"uuid": "5f8d3dd0-6ef1-477a-8ef4-aa3609a8bda6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-47254", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16501", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-47254\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix use-after-free in gfs2_glock_shrink_scan\n\nThe GLF_LRU flag is checked under lru_lock in gfs2_glock_remove_from_lru() to\nremove the glock from the lru list in __gfs2_glock_put().\n\nOn the shrink scan path, the same flag is cleared under lru_lock but because\nof cond_resched_lock(&amp;lru_lock) in gfs2_dispose_glock_lru(), progress on the\nput side can be made without deleting the glock from the lru list.\n\nKeep GLF_LRU across the race window opened by cond_resched_lock(&amp;lru_lock) to\nensure correct behavior on both sides - clear GLF_LRU after list_del under\nlru_lock.\n\ud83d\udccf Published: 2024-05-21T14:19:49.475Z\n\ud83d\udccf Modified: 2025-05-15T12:32:24.776Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/38ce329534500bf4ae71f81df6a37a406cf187b4\n2. https://git.kernel.org/stable/c/92869945cc5b78ee8a1ef90336fe070893e3458a\n3. https://git.kernel.org/stable/c/0364742decb0f02bc183404868b82896f7992595\n4. https://git.kernel.org/stable/c/094bf5670e762afa243d2c41a5c4ab71c7447bf4\n5. https://git.kernel.org/stable/c/86fd5b27db743a0ce0cc245e3a34813b2aa6ec1d\n6. https://git.kernel.org/stable/c/a61156314b66456ab6a291ed5deba1ebd002ab3c\n7. https://git.kernel.org/stable/c/e87ef30fe73e7e10d2c85bdcc778dcec24dca553\n8. https://git.kernel.org/stable/c/1ab19c5de4c537ec0d9b21020395a5b5a6c059b2", "creation_timestamp": "2025-05-15T13:33:49.000000Z"}, {"uuid": "b77be7ef-7715-4f4c-a61a-70c6abb5d4ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2021-47254", "type": "seen", "source": "https://www.hkcert.org/security-bulletin/ubuntu-linux-kernel-multiple-vulnerabilities_20260408", "content": "", "creation_timestamp": "2026-04-07T18:00:00.000000Z"}]}