CVE-2021-47297

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-47297
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-47297.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-47297
Related
Published
2024-05-21T15:15:17Z
Modified
2024-11-06T22:48:50.130967Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

net: fix uninit-value in caifseqpktsendmsg

When nrsegs equal to zero in iovecfromuser, the object msg->msgiter.iov is uninit stack memory in caifseqpktsendmsg which is defined in _syssendmsg. So we cann't just judge msg->msgiter.iov->base directlly. We can use nrsegs to judge msg in caifseqpkt_sendmsg whether has data buffers.

===================================================== BUG: KMSAN: uninit-value in caifseqpktsendmsg+0x693/0xf60 net/caif/caifsocket.c:542 Call Trace: dumpstack lib/dumpstack.c:77 [inline] dumpstack+0x1c9/0x220 lib/dumpstack.c:118 kmsanreport+0xf7/0x1e0 mm/kmsan/kmsanreport.c:118 _msanwarning+0x58/0xa0 mm/kmsan/kmsaninstr.c:215 caifseqpktsendmsg+0x693/0xf60 net/caif/caifsocket.c:542 socksendmsgnosec net/socket.c:652 [inline] socksendmsg net/socket.c:672 [inline] syssendmsg+0x12b6/0x1350 net/socket.c:2343 _syssendmsg net/socket.c:2397 [inline] _syssendmmsg+0x808/0xc90 net/socket.c:2480 _compatsys_sendmmsg net/compat.c:656 [inline]

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.70-1

Affected versions

5.*

5.10.46-4
5.10.46-5
5.10.70-1~bpo10+1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.14.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.14.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}