ALT-PU-2021-3380-2
Package kernel-image-std-def updated to version 5.10.82-alt1 for branch sisyphus in task 290645.
Closed vulnerabilities
Modified: 2024-04-03
BDU:2021-05673
Уязвимость реализации функции tipc_crypto_key_rcv() протокола для внутрикластерного взаимодействия Transparent Inter-Process Communication (TIPC) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
Modified: 2024-11-07
BDU:2022-00828
Уязвимость функции postclose() ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
Modified: 2024-09-13
BDU:2022-04266
Уязвимость функции nci_request (net/nfc/nci/core.c) интерфейса контроллера NFC (NCI) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии
Modified: 2024-09-16
BDU:2024-03691
Уязвимость функции cfg80211_change_iface() в модуле net/wireless/util.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-27
BDU:2024-09144
Уязвимость компонента advansys ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-29
BDU:2024-09177
Уязвимость компонента scsi ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-27
BDU:2024-09178
Уязвимость компонента selinux ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-27
BDU:2024-09209
Уязвимость компонента tusb6010 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-27
BDU:2024-09210
Уязвимость компонента i40e ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-08-19
BDU:2024-09211
Уязвимость компонента tty_buffer ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-27
BDU:2024-09212
Уязвимость компонента tipc ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-27
BDU:2024-09213
Уязвимость компонента arm64 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-27
BDU:2024-09214
Уязвимость компонента btrfs ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-27
BDU:2024-09215
Уязвимость компонента perf bpf ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-29
BDU:2024-09218
Уязвимость компонента scsi ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-27
BDU:2024-09219
Уязвимость компонента scsi ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-27
BDU:2024-09221
Уязвимость компонента mlx5e ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-27
BDU:2024-09223
Уязвимость компонента iavf ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-27
BDU:2024-09225
Уязвимость компонента lpfc ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-27
BDU:2024-09226
Уязвимость компонента dpaa2-eth ядра операционной системы Linux, позволяющая нарушителю повысить привилегии в системе
Modified: 2024-11-27
BDU:2024-09228
Уязвимость компонента ohci-tmio ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-27
BDU:2024-09229
Уязвимость компонента gus ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-27
BDU:2024-09231
Уязвимость компонента typec ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-27
BDU:2024-09232
Уязвимость компонента hyperv ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-27820
A vulnerability was found in Linux kernel, where a use-after-frees in nouveau's postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if "unbind" the driver).
- https://bugzilla.redhat.com/show_bug.cgi?id=1901726
- https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline%40redhat.com/
- https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline%40redhat.com/
- https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline%40redhat.com/
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1901726
- https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline%40redhat.com/
- https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline%40redhat.com/
- https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline%40redhat.com/
- https://www.oracle.com/security-alerts/cpujul2022.html
Modified: 2024-11-21
CVE-2021-4202
A use-after-free flaw was found in nci_request in net/nfc/nci/core.c in NFC Controller Interface (NCI) in the Linux kernel. This flaw could allow a local attacker with user privileges to cause a data race problem while the device is getting removed, leading to a privilege escalation problem.
- http://www.openwall.com/lists/oss-security/2022/06/01/2
- http://www.openwall.com/lists/oss-security/2022/06/04/2
- http://www.openwall.com/lists/oss-security/2022/06/07/2
- https://bugzilla.redhat.com/show_bug.cgi?id=2036682
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3e3b5dfcd16a3e254aab61bd1e8c417dd4503102
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=48b71a9e66c2eab60564b1b1c85f4928ed04e406
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=86cdf8e38792545161dbe3350a7eced558ba4d15
- https://security.netapp.com/advisory/ntap-20220513-0002/
- http://www.openwall.com/lists/oss-security/2022/06/01/2
- http://www.openwall.com/lists/oss-security/2022/06/04/2
- http://www.openwall.com/lists/oss-security/2022/06/07/2
- https://bugzilla.redhat.com/show_bug.cgi?id=2036682
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3e3b5dfcd16a3e254aab61bd1e8c417dd4503102
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=48b71a9e66c2eab60564b1b1c85f4928ed04e406
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=86cdf8e38792545161dbe3350a7eced558ba4d15
- https://security.netapp.com/advisory/ntap-20220513-0002/
Modified: 2024-11-21
CVE-2021-43267
An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. The Transparent Inter-Process Communication (TIPC) functionality allows remote attackers to exploit insufficient validation of user-supplied sizes for the MSG_CRYPTO message type.
- http://www.openwall.com/lists/oss-security/2022/02/10/1
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.16
- https://github.com/torvalds/linux/commit/fa40d9734a57bcbfa79a280189799f76c88f7bb0
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVWL7HZV5T5OEKJPO2D67RMFMKBBXGGB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7/
- https://security.netapp.com/advisory/ntap-20211125-0002/
- http://www.openwall.com/lists/oss-security/2022/02/10/1
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.16
- https://github.com/torvalds/linux/commit/fa40d9734a57bcbfa79a280189799f76c88f7bb0
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVWL7HZV5T5OEKJPO2D67RMFMKBBXGGB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7/
- https://security.netapp.com/advisory/ntap-20211125-0002/
Modified: 2024-12-20
CVE-2021-47181
In the Linux kernel, the following vulnerability has been resolved: usb: musb: tusb6010: check return value after calling platform_get_resource() It will cause null-ptr-deref if platform_get_resource() returns NULL, we need check the return value.
- https://git.kernel.org/stable/c/06cfb4cb2241e704d72e3045cf4d7dfb567fbce0
- https://git.kernel.org/stable/c/14651496a3de6807a17c310f63c894ea0c5d858e
- https://git.kernel.org/stable/c/1ba7605856e05fa991d4654ac69e5ace66c767b9
- https://git.kernel.org/stable/c/28be095eb612a489705d38c210afaf1103c5f4f8
- https://git.kernel.org/stable/c/3ee15f1af17407be381bcf06a78fa60b471242dd
- https://git.kernel.org/stable/c/679eee466d0f9ffa60a2b0c6ec19be5128927f04
- https://git.kernel.org/stable/c/b3f43659eb0b9af2e6ef18a8d829374610b19e7a
- https://git.kernel.org/stable/c/f87a79c04a33ab4e5be598c7b0867e6ef193d702
- https://git.kernel.org/stable/c/06cfb4cb2241e704d72e3045cf4d7dfb567fbce0
- https://git.kernel.org/stable/c/14651496a3de6807a17c310f63c894ea0c5d858e
- https://git.kernel.org/stable/c/1ba7605856e05fa991d4654ac69e5ace66c767b9
- https://git.kernel.org/stable/c/28be095eb612a489705d38c210afaf1103c5f4f8
- https://git.kernel.org/stable/c/3ee15f1af17407be381bcf06a78fa60b471242dd
- https://git.kernel.org/stable/c/679eee466d0f9ffa60a2b0c6ec19be5128927f04
- https://git.kernel.org/stable/c/b3f43659eb0b9af2e6ef18a8d829374610b19e7a
- https://git.kernel.org/stable/c/f87a79c04a33ab4e5be598c7b0867e6ef193d702
Modified: 2025-01-14
CVE-2021-47184
In the Linux kernel, the following vulnerability has been resolved: i40e: Fix NULL ptr dereference on VSI filter sync Remove the reason of null pointer dereference in sync VSI filters. Added new I40E_VSI_RELEASING flag to signalize deleting and releasing of VSI resources to sync this thread with sync filters subtask. Without this patch it is possible to start update the VSI filter list after VSI is removed, that's causing a kernel oops.
- https://git.kernel.org/stable/c/37d9e304acd903a445df8208b8a13d707902dea6
- https://git.kernel.org/stable/c/78f2a9e831f9610e3655a0be5e675e1aa2472089
- https://git.kernel.org/stable/c/87c421ab4a43433cb009fea44bbbc77f46913e1d
- https://git.kernel.org/stable/c/c30162da91327e4cdf7cd03079f096bb3654738c
- https://git.kernel.org/stable/c/e91e8427a1e1633a0261e3bb0201c836ac5b3890
- https://git.kernel.org/stable/c/f866513ead4370402428ef724b03c3312295c178
- https://git.kernel.org/stable/c/37d9e304acd903a445df8208b8a13d707902dea6
- https://git.kernel.org/stable/c/78f2a9e831f9610e3655a0be5e675e1aa2472089
- https://git.kernel.org/stable/c/87c421ab4a43433cb009fea44bbbc77f46913e1d
- https://git.kernel.org/stable/c/c30162da91327e4cdf7cd03079f096bb3654738c
- https://git.kernel.org/stable/c/e91e8427a1e1633a0261e3bb0201c836ac5b3890
- https://git.kernel.org/stable/c/f866513ead4370402428ef724b03c3312295c178
Modified: 2025-03-21
CVE-2021-47185
In the Linux kernel, the following vulnerability has been resolved: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc When running ltp testcase(ltp/testcases/kernel/pty/pty04.c) with arm64, there is a soft lockup, which look like this one: Workqueue: events_unbound flush_to_ldisc Call trace: dump_backtrace+0x0/0x1ec show_stack+0x24/0x30 dump_stack+0xd0/0x128 panic+0x15c/0x374 watchdog_timer_fn+0x2b8/0x304 __run_hrtimer+0x88/0x2c0 __hrtimer_run_queues+0xa4/0x120 hrtimer_interrupt+0xfc/0x270 arch_timer_handler_phys+0x40/0x50 handle_percpu_devid_irq+0x94/0x220 __handle_domain_irq+0x88/0xf0 gic_handle_irq+0x84/0xfc el1_irq+0xc8/0x180 slip_unesc+0x80/0x214 [slip] tty_ldisc_receive_buf+0x64/0x80 tty_port_default_receive_buf+0x50/0x90 flush_to_ldisc+0xbc/0x110 process_one_work+0x1d4/0x4b0 worker_thread+0x180/0x430 kthread+0x11c/0x120 In the testcase pty04, The first process call the write syscall to send data to the pty master. At the same time, the workqueue will do the flush_to_ldisc to pop data in a loop until there is no more data left. When the sender and workqueue running in different core, the sender sends data fastly in full time which will result in workqueue doing work in loop for a long time and occuring softlockup in flush_to_ldisc with kernel configured without preempt. So I add need_resched check and cond_resched in the flush_to_ldisc loop to avoid it.
- https://git.kernel.org/stable/c/0380f643f3a7a61b0845cdc738959c2ad5735d61
- https://git.kernel.org/stable/c/3968ddcf05fb4b9409cd1859feb06a5b0550a1c1
- https://git.kernel.org/stable/c/4c1623651a0936ee197859824cdae6ebbd04d3ed
- https://git.kernel.org/stable/c/4f300f47dbcf9c3d4b2ea76c8554c8f360400725
- https://git.kernel.org/stable/c/5c34486f04700f1ba04907231dce0cc2705c2d7d
- https://git.kernel.org/stable/c/77e9fed33056f2a88eba9dd4d2d5412f0c7d1f41
- https://git.kernel.org/stable/c/b1ffc16ec05ae40d82b6e373322d62e9d6b54fbc
- https://git.kernel.org/stable/c/d491c84df5c469dd9621863b6a770b3428137063
- https://git.kernel.org/stable/c/0380f643f3a7a61b0845cdc738959c2ad5735d61
- https://git.kernel.org/stable/c/3968ddcf05fb4b9409cd1859feb06a5b0550a1c1
- https://git.kernel.org/stable/c/4c1623651a0936ee197859824cdae6ebbd04d3ed
- https://git.kernel.org/stable/c/4f300f47dbcf9c3d4b2ea76c8554c8f360400725
- https://git.kernel.org/stable/c/5c34486f04700f1ba04907231dce0cc2705c2d7d
- https://git.kernel.org/stable/c/77e9fed33056f2a88eba9dd4d2d5412f0c7d1f41
- https://git.kernel.org/stable/c/b1ffc16ec05ae40d82b6e373322d62e9d6b54fbc
- https://git.kernel.org/stable/c/d491c84df5c469dd9621863b6a770b3428137063
Modified: 2025-03-04
CVE-2021-47186
In the Linux kernel, the following vulnerability has been resolved: tipc: check for null after calling kmemdup kmemdup can return a null pointer so need to check for it, otherwise the null key will be dereferenced later in tipc_crypto_key_xmit as can be seen in the trace [1]. [1] https://syzkaller.appspot.com/bug?id=bca180abb29567b189efdbdb34cbf7ba851c2a58
- https://git.kernel.org/stable/c/3e6db079751afd527bf3db32314ae938dc571916
- https://git.kernel.org/stable/c/9404c4145542c23019a80ab1bb2ecf73cd057b10
- https://git.kernel.org/stable/c/a7d91625863d4ffed63b993b5e6dc1298b6430c9
- https://git.kernel.org/stable/c/3e6db079751afd527bf3db32314ae938dc571916
- https://git.kernel.org/stable/c/9404c4145542c23019a80ab1bb2ecf73cd057b10
- https://git.kernel.org/stable/c/a7d91625863d4ffed63b993b5e6dc1298b6430c9
Modified: 2025-03-21
CVE-2021-47187
In the Linux kernel, the following vulnerability has been resolved: arm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency The entry/exit latency and minimum residency in state for the idle states of MSM8998 were ..bad: first of all, for all of them the timings were written for CPU sleep but the min-residency-us param was miscalculated (supposedly, while porting this from downstream); Then, the power collapse states are setting PC on both the CPU cluster *and* the L2 cache, which have different timings: in the specific case of L2 the times are higher so these ones should be taken into account instead of the CPU ones. This parameter misconfiguration was not giving particular issues because on MSM8998 there was no CPU scaling at all, so cluster/L2 power collapse was rarely (if ever) hit. When CPU scaling is enabled, though, the wrong timings will produce SoC unstability shown to the user as random, apparently error-less, sudden reboots and/or lockups. This set of parameters are stabilizing the SoC when CPU scaling is ON and when power collapse is frequently hit.
- https://git.kernel.org/stable/c/118c826ef8b43efe0fda8faf419673707ee8c5e5
- https://git.kernel.org/stable/c/3f1dcaff642e75c1d2ad03f783fa8a3b1f56dd50
- https://git.kernel.org/stable/c/a14d7038ea201c5526375becfc43b9ba281b1e82
- https://git.kernel.org/stable/c/e52fecdd0c142b95c720683885b06ee3f0e065c8
- https://git.kernel.org/stable/c/118c826ef8b43efe0fda8faf419673707ee8c5e5
- https://git.kernel.org/stable/c/3f1dcaff642e75c1d2ad03f783fa8a3b1f56dd50
- https://git.kernel.org/stable/c/a14d7038ea201c5526375becfc43b9ba281b1e82
- https://git.kernel.org/stable/c/e52fecdd0c142b95c720683885b06ee3f0e065c8
Modified: 2025-04-30
CVE-2021-47189
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix memory ordering between normal and ordered work functions
Ordered work functions aren't guaranteed to be handled by the same thread
which executed the normal work functions. The only way execution between
normal/ordered functions is synchronized is via the WORK_DONE_BIT,
unfortunately the used bitops don't guarantee any ordering whatsoever.
This manifested as seemingly inexplicable crashes on ARM64, where
async_chunk::inode is seen as non-null in async_cow_submit which causes
submit_compressed_extents to be called and crash occurs because
async_chunk::inode suddenly became NULL. The call trace was similar to:
pc : submit_compressed_extents+0x38/0x3d0
lr : async_cow_submit+0x50/0xd0
sp : ffff800015d4bc20
- https://git.kernel.org/stable/c/45da9c1767ac31857df572f0a909fbe88fd5a7e9
- https://git.kernel.org/stable/c/47e6f9f69153247109042010f3a77579e9dc61ff
- https://git.kernel.org/stable/c/637d652d351fd4f263ef302dc52f3971d314e500
- https://git.kernel.org/stable/c/670f6b3867c8f0f11e5097f353b164cecfec6179
- https://git.kernel.org/stable/c/6adbc07ebcaf8bead08b21687d49e0fc94400987
- https://git.kernel.org/stable/c/804a9d239ae9cbe88e861a7cd62319cc6ec7b136
- https://git.kernel.org/stable/c/bd660a20fea3ec60a49709ef5360f145ec0fe779
- https://git.kernel.org/stable/c/ed058d735a70f4b063323f1a7bb33cda0f987513
- https://git.kernel.org/stable/c/45da9c1767ac31857df572f0a909fbe88fd5a7e9
- https://git.kernel.org/stable/c/47e6f9f69153247109042010f3a77579e9dc61ff
- https://git.kernel.org/stable/c/637d652d351fd4f263ef302dc52f3971d314e500
- https://git.kernel.org/stable/c/670f6b3867c8f0f11e5097f353b164cecfec6179
- https://git.kernel.org/stable/c/6adbc07ebcaf8bead08b21687d49e0fc94400987
- https://git.kernel.org/stable/c/804a9d239ae9cbe88e861a7cd62319cc6ec7b136
- https://git.kernel.org/stable/c/bd660a20fea3ec60a49709ef5360f145ec0fe779
- https://git.kernel.org/stable/c/ed058d735a70f4b063323f1a7bb33cda0f987513
Modified: 2025-01-07
CVE-2021-47190
In the Linux kernel, the following vulnerability has been resolved: perf bpf: Avoid memory leak from perf_env__insert_btf() perf_env__insert_btf() doesn't insert if a duplicate BTF id is encountered and this causes a memory leak. Modify the function to return a success/error value and then free the memory if insertion didn't happen. v2. Adds a return -1 when the insertion error occurs in perf_env__fetch_btf. This doesn't affect anything as the result is never checked.
- https://git.kernel.org/stable/c/11589d3144bc4e272e0aae46ce8156162e99babc
- https://git.kernel.org/stable/c/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f
- https://git.kernel.org/stable/c/642fc22210a5e59d40b1e4d56d21ec3effd401f2
- https://git.kernel.org/stable/c/ab7c3d8d81c511ddfb27823fb07081c96422b56e
- https://git.kernel.org/stable/c/11589d3144bc4e272e0aae46ce8156162e99babc
- https://git.kernel.org/stable/c/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f
- https://git.kernel.org/stable/c/642fc22210a5e59d40b1e4d56d21ec3effd401f2
- https://git.kernel.org/stable/c/ab7c3d8d81c511ddfb27823fb07081c96422b56e
Modified: 2025-01-14
CVE-2021-47191
In the Linux kernel, the following vulnerability has been resolved: scsi: scsi_debug: Fix out-of-bound read in resp_readcap16() The following warning was observed running syzkaller: [ 3813.830724] sg_write: data in/out 65466/242 bytes for SCSI command 0x9e-- guessing data in; [ 3813.830724] program syz-executor not setting count and/or reply_len properly [ 3813.836956] ================================================================== [ 3813.839465] BUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x157/0x1e0 [ 3813.841773] Read of size 4096 at addr ffff8883cf80f540 by task syz-executor/1549 [ 3813.846612] Call Trace: [ 3813.846995] dump_stack+0x108/0x15f [ 3813.847524] print_address_description+0xa5/0x372 [ 3813.848243] kasan_report.cold+0x236/0x2a8 [ 3813.849439] check_memory_region+0x240/0x270 [ 3813.850094] memcpy+0x30/0x80 [ 3813.850553] sg_copy_buffer+0x157/0x1e0 [ 3813.853032] sg_copy_from_buffer+0x13/0x20 [ 3813.853660] fill_from_dev_buffer+0x135/0x370 [ 3813.854329] resp_readcap16+0x1ac/0x280 [ 3813.856917] schedule_resp+0x41f/0x1630 [ 3813.858203] scsi_debug_queuecommand+0xb32/0x17e0 [ 3813.862699] scsi_dispatch_cmd+0x330/0x950 [ 3813.863329] scsi_request_fn+0xd8e/0x1710 [ 3813.863946] __blk_run_queue+0x10b/0x230 [ 3813.864544] blk_execute_rq_nowait+0x1d8/0x400 [ 3813.865220] sg_common_write.isra.0+0xe61/0x2420 [ 3813.871637] sg_write+0x6c8/0xef0 [ 3813.878853] __vfs_write+0xe4/0x800 [ 3813.883487] vfs_write+0x17b/0x530 [ 3813.884008] ksys_write+0x103/0x270 [ 3813.886268] __x64_sys_write+0x77/0xc0 [ 3813.886841] do_syscall_64+0x106/0x360 [ 3813.887415] entry_SYSCALL_64_after_hwframe+0x44/0xa9 This issue can be reproduced with the following syzkaller log: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') open_by_handle_at(r1, &(0x7f00000003c0)=ANY=[@ANYRESHEX], 0x602000) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x40782) write$binfmt_aout(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000deff000000000000000000000000000000000000000000000000000047f007af9e107a41ec395f1bded7be24277a1501ff6196a83366f4e6362bc0ff2b247f68a972989b094b2da4fb3607fcf611a22dd04310d28c75039d"], 0x126) In resp_readcap16() we get "int alloc_len" value -1104926854, and then pass the huge arr_len to fill_from_dev_buffer(), but arr is only 32 bytes. This leads to OOB in sg_copy_buffer(). To solve this issue, define alloc_len as u32.
- https://git.kernel.org/stable/c/3e20cb072679bdb47747ccc8bee3233a4cf0765a
- https://git.kernel.org/stable/c/4e3ace0051e7e504b55d239daab8789dd89b863c
- https://git.kernel.org/stable/c/5b8bed6464ad6653586e30df046185fd816ad999
- https://git.kernel.org/stable/c/3e20cb072679bdb47747ccc8bee3233a4cf0765a
- https://git.kernel.org/stable/c/4e3ace0051e7e504b55d239daab8789dd89b863c
- https://git.kernel.org/stable/c/5b8bed6464ad6653586e30df046185fd816ad999
Modified: 2025-04-30
CVE-2021-47192
In the Linux kernel, the following vulnerability has been resolved: scsi: core: sysfs: Fix hang when device state is set via sysfs This fixes a regression added with: commit f0f82e2476f6 ("scsi: core: Fix capacity set to zero after offlinining device") The problem is that after iSCSI recovery, iscsid will call into the kernel to set the dev's state to running, and with that patch we now call scsi_rescan_device() with the state_mutex held. If the SCSI error handler thread is just starting to test the device in scsi_send_eh_cmnd() then it's going to try to grab the state_mutex. We are then stuck, because when scsi_rescan_device() tries to send its I/O scsi_queue_rq() calls -> scsi_host_queue_ready() -> scsi_host_in_recovery() which will return true (the host state is still in recovery) and I/O will just be requeued. scsi_send_eh_cmnd() will then never be able to grab the state_mutex to finish error handling. To prevent the deadlock move the rescan-related code to after we drop the state_mutex. This also adds a check for if we are already in the running state. This prevents extra scans and helps the iscsid case where if the transport class has already onlined the device during its recovery process then we don't need userspace to do it again plus possibly block that daemon.
- https://git.kernel.org/stable/c/4edd8cd4e86dd3047e5294bbefcc0a08f66a430f
- https://git.kernel.org/stable/c/a792e0128d232251edb5fdf42fb0f9fbb0b44a73
- https://git.kernel.org/stable/c/bcc0e3175a976b7fa9a353960808adb0bb49ead8
- https://git.kernel.org/stable/c/edd783162bf2385b43de6764f2d4c6e9f4f6be27
- https://git.kernel.org/stable/c/4edd8cd4e86dd3047e5294bbefcc0a08f66a430f
- https://git.kernel.org/stable/c/a792e0128d232251edb5fdf42fb0f9fbb0b44a73
- https://git.kernel.org/stable/c/bcc0e3175a976b7fa9a353960808adb0bb49ead8
- https://git.kernel.org/stable/c/edd783162bf2385b43de6764f2d4c6e9f4f6be27
Modified: 2024-11-21
CVE-2021-47194
In the Linux kernel, the following vulnerability has been resolved: cfg80211: call cfg80211_stop_ap when switch from P2P_GO type If the userspace tools switch from NL80211_IFTYPE_P2P_GO to NL80211_IFTYPE_ADHOC via send_msg(NL80211_CMD_SET_INTERFACE), it does not call the cleanup cfg80211_stop_ap(), this leads to the initialization of in-use data. For example, this path re-init the sdata->assigned_chanctx_list while it is still an element of assigned_vifs list, and makes that linked list corrupt.
- https://git.kernel.org/stable/c/0738cdb636c21ab552eaecf905efa4a6070e3ebc
- https://git.kernel.org/stable/c/4e458abbb4a523f1413bfe15c079cf4e24c15b21
- https://git.kernel.org/stable/c/52affc201fc22a1ab9a59ef0ed641a9adfcb8d13
- https://git.kernel.org/stable/c/563fbefed46ae4c1f70cffb8eb54c02df480b2c2
- https://git.kernel.org/stable/c/5a9b671c8d74a3e1b999e7a0c7f366079bcc93dd
- https://git.kernel.org/stable/c/7b97b5776daa0b39dbdadfea176f9cc0646d4a66
- https://git.kernel.org/stable/c/8f06bb8c216bcd172394f61e557727e691b4cb24
- https://git.kernel.org/stable/c/b8a045e2a9b234cfbc06cf36923886164358ddec
- https://git.kernel.org/stable/c/0738cdb636c21ab552eaecf905efa4a6070e3ebc
- https://git.kernel.org/stable/c/4e458abbb4a523f1413bfe15c079cf4e24c15b21
- https://git.kernel.org/stable/c/52affc201fc22a1ab9a59ef0ed641a9adfcb8d13
- https://git.kernel.org/stable/c/563fbefed46ae4c1f70cffb8eb54c02df480b2c2
- https://git.kernel.org/stable/c/5a9b671c8d74a3e1b999e7a0c7f366079bcc93dd
- https://git.kernel.org/stable/c/7b97b5776daa0b39dbdadfea176f9cc0646d4a66
- https://git.kernel.org/stable/c/8f06bb8c216bcd172394f61e557727e691b4cb24
- https://git.kernel.org/stable/c/b8a045e2a9b234cfbc06cf36923886164358ddec
Modified: 2025-03-21
CVE-2021-47197
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: nullify cq->dbg pointer in mlx5_debug_cq_remove() Prior to this patch in case mlx5_core_destroy_cq() failed it proceeds to rest of destroy operations. mlx5_core_destroy_cq() could be called again by user and cause additional call of mlx5_debug_cq_remove(). cq->dbg was not nullify in previous call and cause the crash. Fix it by nullify cq->dbg pointer after removal. Also proceed to destroy operations only if FW return 0 for MLX5_CMD_OP_DESTROY_CQ command. general protection fault, probably for non-canonical address 0x2000300004058: 0000 [#1] SMP PTI CPU: 5 PID: 1228 Comm: python Not tainted 5.15.0-rc5_for_upstream_min_debug_2021_10_14_11_06 #1 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 RIP: 0010:lockref_get+0x1/0x60 Code: 5d e9 53 ff ff ff 48 8d 7f 70 e8 0a 2e 48 00 c7 85 d0 00 00 00 02 00 00 00 c6 45 70 00 fb 5d c3 c3 cc cc cc cc cc cc cc cc 53 <48> 8b 17 48 89 fb 85 d2 75 3d 48 89 d0 bf 64 00 00 00 48 89 c1 48 RSP: 0018:ffff888137dd7a38 EFLAGS: 00010206 RAX: 0000000000000000 RBX: ffff888107d5f458 RCX: 00000000fffffffe RDX: 000000000002c2b0 RSI: ffffffff8155e2e0 RDI: 0002000300004058 RBP: ffff888137dd7a88 R08: 0002000300004058 R09: ffff8881144a9f88 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8881141d4000 R13: ffff888137dd7c68 R14: ffff888137dd7d58 R15: ffff888137dd7cc0 FS: 00007f4644f2a4c0(0000) GS:ffff8887a2d40000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055b4500f4380 CR3: 0000000114f7a003 CR4: 0000000000170ea0 Call Trace: simple_recursive_removal+0x33/0x2e0 ? debugfs_remove+0x60/0x60 debugfs_remove+0x40/0x60 mlx5_debug_cq_remove+0x32/0x70 [mlx5_core] mlx5_core_destroy_cq+0x41/0x1d0 [mlx5_core] devx_obj_cleanup+0x151/0x330 [mlx5_ib] ? __pollwait+0xd0/0xd0 ? xas_load+0x5/0x70 ? xa_load+0x62/0xa0 destroy_hw_idr_uobject+0x20/0x80 [ib_uverbs] uverbs_destroy_uobject+0x3b/0x360 [ib_uverbs] uobj_destroy+0x54/0xa0 [ib_uverbs] ib_uverbs_cmd_verbs+0xaf2/0x1160 [ib_uverbs] ? uverbs_finalize_object+0xd0/0xd0 [ib_uverbs] ib_uverbs_ioctl+0xc4/0x1b0 [ib_uverbs] __x64_sys_ioctl+0x3e4/0x8e0
- https://git.kernel.org/stable/c/2ae38157080616a13a9fe3f0b4b6ec0070aa408a
- https://git.kernel.org/stable/c/471c492890557bd58f73314bb4ad85d5a8fd5026
- https://git.kernel.org/stable/c/76ded29d3fcda4928da8849ffc446ea46871c1c2
- https://git.kernel.org/stable/c/2ae38157080616a13a9fe3f0b4b6ec0070aa408a
- https://git.kernel.org/stable/c/471c492890557bd58f73314bb4ad85d5a8fd5026
- https://git.kernel.org/stable/c/76ded29d3fcda4928da8849ffc446ea46871c1c2
Modified: 2025-03-27
CVE-2021-47201
In the Linux kernel, the following vulnerability has been resolved: iavf: free q_vectors before queues in iavf_disable_vf iavf_free_queues() clears adapter->num_active_queues, which iavf_free_q_vectors() relies on, so swap the order of these two function calls in iavf_disable_vf(). This resolves a panic encountered when the interface is disabled and then later brought up again after PF communication is restored.
- https://git.kernel.org/stable/c/78638b47132244e3934dc5dc79f6372d5ce8e98c
- https://git.kernel.org/stable/c/89f22f129696ab53cfbc608e0a2184d0fea46ac1
- https://git.kernel.org/stable/c/926e8c83d4c1c2dac0026637eb0d492df876489e
- https://git.kernel.org/stable/c/9ef6589cac9a8c47f5544ccdf4c498093733bb3f
- https://git.kernel.org/stable/c/78638b47132244e3934dc5dc79f6372d5ce8e98c
- https://git.kernel.org/stable/c/89f22f129696ab53cfbc608e0a2184d0fea46ac1
- https://git.kernel.org/stable/c/926e8c83d4c1c2dac0026637eb0d492df876489e
- https://git.kernel.org/stable/c/9ef6589cac9a8c47f5544ccdf4c498093733bb3f
Modified: 2025-03-27
CVE-2021-47203
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() When parsing the txq list in lpfc_drain_txq(), the driver attempts to pass the requests to the adapter. If such an attempt fails, a local "fail_msg" string is set and a log message output. The job is then added to a completions list for cancellation. Processing of any further jobs from the txq list continues, but since "fail_msg" remains set, jobs are added to the completions list regardless of whether a wqe was passed to the adapter. If successfully added to txcmplq, jobs are added to both lists resulting in list corruption. Fix by clearing the fail_msg string after adding a job to the completions list. This stops the subsequent jobs from being added to the completions list unless they had an appropriate failure.
- https://git.kernel.org/stable/c/16bcbfb56d759c25665f786e33ec633b9508a08f
- https://git.kernel.org/stable/c/814d3610c4ce86e8cf285b2cdac0057a42e82de5
- https://git.kernel.org/stable/c/99154581b05c8fb22607afb7c3d66c1bace6aa5d
- https://git.kernel.org/stable/c/ad4776b5eb2e58af1226847fcd3b4f6d051674dd
- https://git.kernel.org/stable/c/b291d147d0268e93ad866f8bc820ea14497abc9b
- https://git.kernel.org/stable/c/c097bd5a59162156d9c2077a2f58732ffbaa9fca
- https://git.kernel.org/stable/c/ec70d80a8642900086447ba0cdc79e3f44d42e8f
- https://git.kernel.org/stable/c/f05a0191b90156e539cccc189b9d87ca2a4d9305
- https://git.kernel.org/stable/c/16bcbfb56d759c25665f786e33ec633b9508a08f
- https://git.kernel.org/stable/c/814d3610c4ce86e8cf285b2cdac0057a42e82de5
- https://git.kernel.org/stable/c/99154581b05c8fb22607afb7c3d66c1bace6aa5d
- https://git.kernel.org/stable/c/ad4776b5eb2e58af1226847fcd3b4f6d051674dd
- https://git.kernel.org/stable/c/b291d147d0268e93ad866f8bc820ea14497abc9b
- https://git.kernel.org/stable/c/c097bd5a59162156d9c2077a2f58732ffbaa9fca
- https://git.kernel.org/stable/c/ec70d80a8642900086447ba0cdc79e3f44d42e8f
- https://git.kernel.org/stable/c/f05a0191b90156e539cccc189b9d87ca2a4d9305
Modified: 2025-01-14
CVE-2021-47204
In the Linux kernel, the following vulnerability has been resolved: net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove Access to netdev after free_netdev() will cause use-after-free bug. Move debug log before free_netdev() call to avoid it.
- https://git.kernel.org/stable/c/1c4099dc0d6a01e76e4f7dd98e4b3e0d55d80ad9
- https://git.kernel.org/stable/c/32d4686224744819ddcae58b666c21d2a4ef4c88
- https://git.kernel.org/stable/c/9b5a333272a48c2f8b30add7a874e46e8b26129c
- https://git.kernel.org/stable/c/d74ff10ed2d93dc9b67e99a74b36fb9a83273d8a
- https://git.kernel.org/stable/c/1c4099dc0d6a01e76e4f7dd98e4b3e0d55d80ad9
- https://git.kernel.org/stable/c/32d4686224744819ddcae58b666c21d2a4ef4c88
- https://git.kernel.org/stable/c/9b5a333272a48c2f8b30add7a874e46e8b26129c
- https://git.kernel.org/stable/c/d74ff10ed2d93dc9b67e99a74b36fb9a83273d8a
Modified: 2025-01-07
CVE-2021-47206
In the Linux kernel, the following vulnerability has been resolved: usb: host: ohci-tmio: check return value after calling platform_get_resource() It will cause null-ptr-deref if platform_get_resource() returns NULL, we need check the return value.
- https://git.kernel.org/stable/c/065334f6640d074a1caec2f8b0091467a22f9483
- https://git.kernel.org/stable/c/2474eb7fc3bfbce10f7b8ea431fcffe5dd5f5100
- https://git.kernel.org/stable/c/28e016e02118917e50a667bc72fb80098cf2b460
- https://git.kernel.org/stable/c/2f18f97a1a787154a372c0738f1576f14b693d91
- https://git.kernel.org/stable/c/951b8239fd24678b56c995c5c0456ab12e059d19
- https://git.kernel.org/stable/c/9eff2b2e59fda25051ab36cd1cb5014661df657b
- https://git.kernel.org/stable/c/bb6ed2e05eb6e8619b30fa854f9becd50c11723f
- https://git.kernel.org/stable/c/f98986b7acb4219f95789095eced93ed69d81d35
- https://git.kernel.org/stable/c/065334f6640d074a1caec2f8b0091467a22f9483
- https://git.kernel.org/stable/c/2474eb7fc3bfbce10f7b8ea431fcffe5dd5f5100
- https://git.kernel.org/stable/c/28e016e02118917e50a667bc72fb80098cf2b460
- https://git.kernel.org/stable/c/2f18f97a1a787154a372c0738f1576f14b693d91
- https://git.kernel.org/stable/c/951b8239fd24678b56c995c5c0456ab12e059d19
- https://git.kernel.org/stable/c/9eff2b2e59fda25051ab36cd1cb5014661df657b
- https://git.kernel.org/stable/c/bb6ed2e05eb6e8619b30fa854f9becd50c11723f
- https://git.kernel.org/stable/c/f98986b7acb4219f95789095eced93ed69d81d35
Modified: 2025-01-13
CVE-2021-47207
In the Linux kernel, the following vulnerability has been resolved: ALSA: gus: fix null pointer dereference on pointer block The pointer block return from snd_gf1_dma_next_block could be null, so there is a potential null pointer dereference issue. Fix this by adding a null check before dereference.
- https://git.kernel.org/stable/c/16721797dcef2c7c030ffe73a07f39a65f9323c3
- https://git.kernel.org/stable/c/1ac6cd87d8ddd36c43620f82c4d65b058f725f0f
- https://git.kernel.org/stable/c/3e28e083dcdf03a18a083f8a47b6bb6b1604b5be
- https://git.kernel.org/stable/c/542fa721594a02d2aee0370a764d306ef48d030c
- https://git.kernel.org/stable/c/a0d21bb3279476c777434c40d969ea88ca64f9aa
- https://git.kernel.org/stable/c/ab4c1ebc40f699f48346f634d7b72b9c5193f315
- https://git.kernel.org/stable/c/c6d2cefdd05c4810c416fb8d384b5c377bd977bc
- https://git.kernel.org/stable/c/cb09c760c201f82df83babc92a5ffea0a01807fc
- https://git.kernel.org/stable/c/16721797dcef2c7c030ffe73a07f39a65f9323c3
- https://git.kernel.org/stable/c/1ac6cd87d8ddd36c43620f82c4d65b058f725f0f
- https://git.kernel.org/stable/c/3e28e083dcdf03a18a083f8a47b6bb6b1604b5be
- https://git.kernel.org/stable/c/542fa721594a02d2aee0370a764d306ef48d030c
- https://git.kernel.org/stable/c/a0d21bb3279476c777434c40d969ea88ca64f9aa
- https://git.kernel.org/stable/c/ab4c1ebc40f699f48346f634d7b72b9c5193f315
- https://git.kernel.org/stable/c/c6d2cefdd05c4810c416fb8d384b5c377bd977bc
- https://git.kernel.org/stable/c/cb09c760c201f82df83babc92a5ffea0a01807fc
Modified: 2025-03-27
CVE-2021-47210
In the Linux kernel, the following vulnerability has been resolved: usb: typec: tipd: Remove WARN_ON in tps6598x_block_read Calling tps6598x_block_read with a higher than allowed len can be handled by just returning an error. There's no need to crash systems with panic-on-warn enabled.
- https://git.kernel.org/stable/c/2a897d384513ba7f7ef05611338b9a6ec6aeac00
- https://git.kernel.org/stable/c/2c71811c963b6c310a29455d521d31a7ea6c5b5e
- https://git.kernel.org/stable/c/30dcfcda8992dc42f18e7d35b6a1fa72372d382d
- https://git.kernel.org/stable/c/b7a0a63f3fed57d413bb857de164ea9c3984bc4e
- https://git.kernel.org/stable/c/eff8b7628410cb2eb562ca0d5d1f12e27063733e
- https://git.kernel.org/stable/c/2a897d384513ba7f7ef05611338b9a6ec6aeac00
- https://git.kernel.org/stable/c/2c71811c963b6c310a29455d521d31a7ea6c5b5e
- https://git.kernel.org/stable/c/30dcfcda8992dc42f18e7d35b6a1fa72372d382d
- https://git.kernel.org/stable/c/b7a0a63f3fed57d413bb857de164ea9c3984bc4e
- https://git.kernel.org/stable/c/eff8b7628410cb2eb562ca0d5d1f12e27063733e
Modified: 2025-03-18
CVE-2021-47216
In the Linux kernel, the following vulnerability has been resolved: scsi: advansys: Fix kernel pointer leak Pointers should be printed with %p or %px rather than cast to 'unsigned long' and printed with %lx. Change %lx to %p to print the hashed pointer.
- https://git.kernel.org/stable/c/055eced3edf5b675d12189081303f6285ef26511
- https://git.kernel.org/stable/c/06d7d12efb5c62db9dea15141ae2b322c2719515
- https://git.kernel.org/stable/c/27490ae6a85a70242d80615ca74d0362a820d6a7
- https://git.kernel.org/stable/c/5612287991debe310c914600599bd59511ababfb
- https://git.kernel.org/stable/c/ad19f7046c24f95c674fbea21870479b2b9f5bab
- https://git.kernel.org/stable/c/cc248790bfdcf879e3094fa248c85bf92cdf9dae
- https://git.kernel.org/stable/c/d4996c6eac4c81b8872043e9391563f67f13e406
- https://git.kernel.org/stable/c/f5a0ba4a9b5e70e7b2f767636d26523f9d1ac59d
- https://git.kernel.org/stable/c/055eced3edf5b675d12189081303f6285ef26511
- https://git.kernel.org/stable/c/06d7d12efb5c62db9dea15141ae2b322c2719515
- https://git.kernel.org/stable/c/27490ae6a85a70242d80615ca74d0362a820d6a7
- https://git.kernel.org/stable/c/5612287991debe310c914600599bd59511ababfb
- https://git.kernel.org/stable/c/ad19f7046c24f95c674fbea21870479b2b9f5bab
- https://git.kernel.org/stable/c/cc248790bfdcf879e3094fa248c85bf92cdf9dae
- https://git.kernel.org/stable/c/d4996c6eac4c81b8872043e9391563f67f13e406
- https://git.kernel.org/stable/c/f5a0ba4a9b5e70e7b2f767636d26523f9d1ac59d
Modified: 2025-01-14
CVE-2021-47217
In the Linux kernel, the following vulnerability has been resolved: x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails Check for a valid hv_vp_index array prior to derefencing hv_vp_index when setting Hyper-V's TSC change callback. If Hyper-V setup failed in hyperv_init(), the kernel will still report that it's running under Hyper-V, but will have silently disabled nearly all functionality. BUG: kernel NULL pointer dereference, address: 0000000000000010 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: 0000 [#1] SMP CPU: 4 PID: 1 Comm: swapper/0 Not tainted 5.15.0-rc2+ #75 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 RIP: 0010:set_hv_tscchange_cb+0x15/0xa0 Code: <8b> 04 82 8b 15 12 17 85 01 48 c1 e0 20 48 0d ee 00 01 00 f6 c6 08 ... Call Trace: kvm_arch_init+0x17c/0x280 kvm_init+0x31/0x330 vmx_init+0xba/0x13a do_one_initcall+0x41/0x1c0 kernel_init_freeable+0x1f2/0x23b kernel_init+0x16/0x120 ret_from_fork+0x22/0x30
- https://git.kernel.org/stable/c/8823ea27fff6084bbb4bc71d15378fae0220b1d8
- https://git.kernel.org/stable/c/9c177eee116cf888276d3748cb176e72562cfd5c
- https://git.kernel.org/stable/c/b0e44dfb4e4c699cca33ede431b8d127e6e8d661
- https://git.kernel.org/stable/c/b20ec58f8a6f4fef32cc71480ddf824584e24743
- https://git.kernel.org/stable/c/daf972118c517b91f74ff1731417feb4270625a4
- https://git.kernel.org/stable/c/8823ea27fff6084bbb4bc71d15378fae0220b1d8
- https://git.kernel.org/stable/c/9c177eee116cf888276d3748cb176e72562cfd5c
- https://git.kernel.org/stable/c/b0e44dfb4e4c699cca33ede431b8d127e6e8d661
- https://git.kernel.org/stable/c/b20ec58f8a6f4fef32cc71480ddf824584e24743
- https://git.kernel.org/stable/c/daf972118c517b91f74ff1731417feb4270625a4
Modified: 2025-01-14
CVE-2021-47218
In the Linux kernel, the following vulnerability has been resolved: selinux: fix NULL-pointer dereference when hashtab allocation fails When the hash table slot array allocation fails in hashtab_init(), h->size is left initialized with a non-zero value, but the h->htable pointer is NULL. This may then cause a NULL pointer dereference, since the policydb code relies on the assumption that even after a failed hashtab_init(), hashtab_map() and hashtab_destroy() can be safely called on it. Yet, these detect an empty hashtab only by looking at the size. Fix this by making sure that hashtab_init() always leaves behind a valid empty hashtab when the allocation fails.
- https://git.kernel.org/stable/c/83c8ab8503adf56bf68dafc7a382f4946c87da79
- https://git.kernel.org/stable/c/b17dd53cac769dd13031b0ca34f90cc65e523fab
- https://git.kernel.org/stable/c/dc27f3c5d10c58069672215787a96b4fae01818b
- https://git.kernel.org/stable/c/83c8ab8503adf56bf68dafc7a382f4946c87da79
- https://git.kernel.org/stable/c/b17dd53cac769dd13031b0ca34f90cc65e523fab
- https://git.kernel.org/stable/c/dc27f3c5d10c58069672215787a96b4fae01818b
Modified: 2025-03-04
CVE-2021-47219
In the Linux kernel, the following vulnerability has been resolved: scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() The following issue was observed running syzkaller: BUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:377 [inline] BUG: KASAN: slab-out-of-bounds in sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831 Read of size 2132 at addr ffff8880aea95dc8 by task syz-executor.0/9815 CPU: 0 PID: 9815 Comm: syz-executor.0 Not tainted 4.19.202-00874-gfc0fe04215a9 #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0xe4/0x14a lib/dump_stack.c:118 print_address_description+0x73/0x280 mm/kasan/report.c:253 kasan_report_error mm/kasan/report.c:352 [inline] kasan_report+0x272/0x370 mm/kasan/report.c:410 memcpy+0x1f/0x50 mm/kasan/kasan.c:302 memcpy include/linux/string.h:377 [inline] sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831 fill_from_dev_buffer+0x14f/0x340 drivers/scsi/scsi_debug.c:1021 resp_report_tgtpgs+0x5aa/0x770 drivers/scsi/scsi_debug.c:1772 schedule_resp+0x464/0x12f0 drivers/scsi/scsi_debug.c:4429 scsi_debug_queuecommand+0x467/0x1390 drivers/scsi/scsi_debug.c:5835 scsi_dispatch_cmd+0x3fc/0x9b0 drivers/scsi/scsi_lib.c:1896 scsi_request_fn+0x1042/0x1810 drivers/scsi/scsi_lib.c:2034 __blk_run_queue_uncond block/blk-core.c:464 [inline] __blk_run_queue+0x1a4/0x380 block/blk-core.c:484 blk_execute_rq_nowait+0x1c2/0x2d0 block/blk-exec.c:78 sg_common_write.isra.19+0xd74/0x1dc0 drivers/scsi/sg.c:847 sg_write.part.23+0x6e0/0xd00 drivers/scsi/sg.c:716 sg_write+0x64/0xa0 drivers/scsi/sg.c:622 __vfs_write+0xed/0x690 fs/read_write.c:485 kill_bdev:block_device:00000000e138492c vfs_write+0x184/0x4c0 fs/read_write.c:549 ksys_write+0x107/0x240 fs/read_write.c:599 do_syscall_64+0xc2/0x560 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe We get 'alen' from command its type is int. If userspace passes a large length we will get a negative 'alen'. Switch n, alen, and rlen to u32.
- https://git.kernel.org/stable/c/66523553fa62c7878fc5441dc4e82be71934eb77
- https://git.kernel.org/stable/c/8440377e1a5644779b4c8d013aa2a917f5fc83c3
- https://git.kernel.org/stable/c/f347c26836c270199de1599c3cd466bb7747caa9
- https://git.kernel.org/stable/c/66523553fa62c7878fc5441dc4e82be71934eb77
- https://git.kernel.org/stable/c/8440377e1a5644779b4c8d013aa2a917f5fc83c3
- https://git.kernel.org/stable/c/f347c26836c270199de1599c3cd466bb7747caa9
