CVE-2021-47240

In the Linux kernel, the following vulnerability has been resolved: net: qrtr: fix OOB Read in qrtr_endpoint_post Syzbot reported slab-out-of-bounds Read in qrtr_endpoint_post. The problem was in wrong _size_ type: if (len != ALIGN(size, 4) + hdrlen) goto err; If size from qrtr_hdr is 4294967293 (0xfffffffd), the result of ALIGN(size, 4) will be 0. In case of len == hdrlen and size == 4294967293 in header this check won't fail and skb_put_data(skb, data + hdrlen, size); will read out of bound from data, which is hdrlen allocated block.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*

History

30 Dec 2024, 19:04

Type Values Removed Values Added
CWE CWE-125
CPE cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/19892ab9c9d838e2e5a7744d36e4bb8b7c3292fe - () https://git.kernel.org/stable/c/19892ab9c9d838e2e5a7744d36e4bb8b7c3292fe - Patch
References () https://git.kernel.org/stable/c/26b8d10703a9be45d6097946b2b4011f7dd2c56f - () https://git.kernel.org/stable/c/26b8d10703a9be45d6097946b2b4011f7dd2c56f - Patch
References () https://git.kernel.org/stable/c/960b08dd36de1e341e3eb43d1c547513e338f4f8 - () https://git.kernel.org/stable/c/960b08dd36de1e341e3eb43d1c547513e338f4f8 - Patch
References () https://git.kernel.org/stable/c/ad9d24c9429e2159d1e279dc3a83191ccb4daf1d - () https://git.kernel.org/stable/c/ad9d24c9429e2159d1e279dc3a83191ccb4daf1d - Patch
References () https://git.kernel.org/stable/c/f8111c0d7ed42ede41a3d0d393b104de0730a8a6 - () https://git.kernel.org/stable/c/f8111c0d7ed42ede41a3d0d393b104de0730a8a6 - Patch

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/19892ab9c9d838e2e5a7744d36e4bb8b7c3292fe - () https://git.kernel.org/stable/c/19892ab9c9d838e2e5a7744d36e4bb8b7c3292fe -
References () https://git.kernel.org/stable/c/26b8d10703a9be45d6097946b2b4011f7dd2c56f - () https://git.kernel.org/stable/c/26b8d10703a9be45d6097946b2b4011f7dd2c56f -
References () https://git.kernel.org/stable/c/960b08dd36de1e341e3eb43d1c547513e338f4f8 - () https://git.kernel.org/stable/c/960b08dd36de1e341e3eb43d1c547513e338f4f8 -
References () https://git.kernel.org/stable/c/ad9d24c9429e2159d1e279dc3a83191ccb4daf1d - () https://git.kernel.org/stable/c/ad9d24c9429e2159d1e279dc3a83191ccb4daf1d -
References () https://git.kernel.org/stable/c/f8111c0d7ed42ede41a3d0d393b104de0730a8a6 - () https://git.kernel.org/stable/c/f8111c0d7ed42ede41a3d0d393b104de0730a8a6 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: qrtr: arreglar OOB Lectura en qrtr_endpoint_post. Syzbot reportó slab-out-of-bounds Lectura en qrtr_endpoint_post. El problema estaba en el tipo de _tamaño_ incorrecto: if (len != ALIGN(size, 4) + hdrlen) goto err; Si el tamaño de qrtr_hdr es 4294967293 (0xfffffffd), el resultado de ALIGN(size, 4) será 0. En caso de len == hdrlen y size == 4294967293 en el encabezado, esta verificación no fallará y skb_put_data(skb, data + hdrlen, tamaño); leerá fuera de los límites de los datos, que son bloques asignados hdrlen.

21 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 15:15

Updated : 2024-12-30 19:04


NVD link : CVE-2021-47240

Mitre link : CVE-2021-47240

CVE.ORG link : CVE-2021-47240


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read