CVE-2021-47619

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2021-47619
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47619.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-47619
Related
Published
2024-06-20T11:15:54Z
Modified
2024-09-18T18:46:29.295083Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix queues reservation for XDP

When XDP was configured on a system with large number of CPUs and X722 NIC there was a call trace with NULL pointer dereference.

i40e 0000:87:00.0: failed to get tracking for 256 queues for VSI 0 err -12 i40e 0000:87:00.0: setup of MAIN VSI failed

BUG: kernel NULL pointer dereference, address: 0000000000000000 RIP: 0010:i40exdp+0xea/0x1b0 [i40e] Call Trace: ? i40ereconfigrssqueues+0x130/0x130 [i40e] devxdpinstall+0x61/0xe0 devxdpattach+0x18a/0x4c0 devchangexdpfd+0x1e6/0x220 dosetlink+0x616/0x1030 ? ahciportstop+0x80/0x80 ? ataqcissue+0x107/0x1e0 ? locktimerbase+0x61/0x80 ? _modtimer+0x202/0x380 rtnlsetlink+0xe5/0x170 ? bpflsmbindertransaction+0x10/0x10 ? securitycapable+0x36/0x50 rtnetlinkrcvmsg+0x121/0x350 ? rtnlcalcit.isra.0+0x100/0x100 netlinkrcvskb+0x50/0xf0 netlinkunicast+0x1d3/0x2a0 netlinksendmsg+0x22a/0x440 socksendmsg+0x5e/0x60 _syssendto+0xf0/0x160 ? _sysgetsockname+0x7e/0xc0 ? _copyfromuser+0x3c/0x80 ? _syssetsockopt+0xc8/0x1a0 _x64syssendto+0x20/0x30 dosyscall64+0x33/0x40 entrySYSCALL64afterhwframe+0x44/0xae RIP: 0033:0x7f83fa7a39e0

This was caused by PF queue pile fragmentation due to flow director VSI queue being placed right after main VSI. Because of this main VSI was not able to resize its queue allocation for XDP resulting in no queues allocated for main VSI when XDP was turned on.

Fix this by always allocating last queue in PF queue pile for a flow director VSI.

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.103-1

Affected versions

5.*

5.10.46-4
5.10.46-5
5.10.70-1~bpo10+1
5.10.70-1
5.10.84-1
5.10.92-1~bpo10+1
5.10.92-1
5.10.92-2
5.10.103-1~bpo10+1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.16.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.16.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}