CVE-2021-47056

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-47056
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47056.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-47056
Related
Published
2024-02-29T23:15:07Z
Modified
2024-09-18T01:00:20Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

crypto: qat - ADFSTATUSPFRUNNING should be set after adfdev_init

ADFSTATUSPFRUNNING is (only) used and checked by adfvf2pfshutdown() before calling adfiovputmsg()->mutexlock(vf2pflock), however the vf2pflock is initialized in adfdevinit(), which can fail and when it fail, the vf2pflock is either not initialized or destroyed, a subsequent use of vf2pflock will cause issue. To fix this issue, only set this flag if adfdevinit() returns 0.

[ 7.178404] BUG: KASAN: user-memory-access in _mutexlock.isra.0+0x1ac/0x7c0 [ 7.180345] Call Trace: [ 7.182576] mutexlock+0xc9/0xd0 [ 7.183257] adfiovputmsg+0x118/0x1a0 [intelqat] [ 7.183541] adfvf2pfshutdown+0x4d/0x7b [intelqat] [ 7.183834] adfdevshutdown+0x172/0x2b0 [intelqat] [ 7.184127] adfprobe+0x5e9/0x600 [qatdh895xccvf]

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.38-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.38-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.38-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}