CVE-2021-47569

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-47569
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-47569.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-47569
Related
Published
2024-05-24T15:15:22Z
Modified
2024-09-11T02:00:04Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

io_uring: fail cancellation for EXITING tasks

WARNING: CPU: 1 PID: 20 at fs/iouring.c:6269 iotrycanceluserdata+0x3c5/0x640 fs/iouring.c:6269 CPU: 1 PID: 20 Comm: kworker/1:0 Not tainted 5.16.0-rc1-syzkaller #0 Workqueue: events iofallbackreqfunc RIP: 0010:iotrycanceluserdata+0x3c5/0x640 fs/iouring.c:6269 Call Trace: <TASK> ioreqtasklinktimeout+0x6b/0x1e0 fs/iouring.c:6886 iofallbackreqfunc+0xf9/0x1ae fs/iouring.c:1334 processonework+0x9b2/0x1690 kernel/workqueue.c:2298 workerthread+0x658/0x11f0 kernel/workqueue.c:2445 kthread+0x405/0x4f0 kernel/kthread.c:327 retfromfork+0x1f/0x30 arch/x86/entry/entry_64.S:295 </TASK>

We need original task's context to do cancellations, so if it's dying and the callback is executed in a fallback mode, fail the cancellation attempt.

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.15-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.15-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}