CVE-2021-47523

Source
https://cve.org/CVERecord?id=CVE-2021-47523
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47523.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-47523
Downstream
Related
Published
2024-05-24T15:15:14.743Z
Modified
2026-03-15T22:00:20.970591Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

IB/hfi1: Fix leak of rcvhdrtaildummykvaddr

This buffer is currently allocated in hfi1_init():

if (reinit)
    ret = init_after_reset(dd);
else
    ret = loadtime_init(dd);
if (ret)
    goto done;

/* allocate dummy tail memory for all receive contexts */
dd->rcvhdrtail_dummy_kvaddr = dma_alloc_coherent(&dd->pcidev->dev,
                         sizeof(u64),
                         &dd->rcvhdrtail_dummy_dma,
                         GFP_KERNEL);

if (!dd->rcvhdrtail_dummy_kvaddr) {
    dd_dev_err(dd, "cannot allocate dummy tail memory\n");
    ret = -ENOMEM;
    goto done;
}

The reinit triggered path will overwrite the old allocation and leak it.

Fix by moving the allocation to hfi1allocdevdata() and the deallocation to hfi1freedevdata().

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47523.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "4.5"
            },
            {
                "fixed": "5.10.85"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "5.11"
            },
            {
                "fixed": "5.15.8"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "5.16-rc1"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "5.16-rc2"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "5.16-rc3"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "5.16-rc4"
            }
        ]
    }
]