CVE-2021-47095
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
04/03/2024
Last modified:
07/01/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ipmi: ssif: initialize ssif_info->client early<br />
<br />
During probe ssif_info->client is dereferenced in error path. However,<br />
it is set when some of the error checking has already been done. This<br />
causes following kernel crash if an error path is taken:<br />
<br />
[ 30.645593][ T674] ipmi_ssif 0-000e: ipmi_ssif: Not probing, Interface already present<br />
[ 30.657616][ T674] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000088<br />
...<br />
[ 30.657723][ T674] pc : __dev_printk+0x28/0xa0<br />
[ 30.657732][ T674] lr : _dev_err+0x7c/0xa0<br />
...<br />
[ 30.657772][ T674] Call trace:<br />
[ 30.657775][ T674] __dev_printk+0x28/0xa0<br />
[ 30.657778][ T674] _dev_err+0x7c/0xa0<br />
[ 30.657781][ T674] ssif_probe+0x548/0x900 [ipmi_ssif 62ce4b08badc1458fd896206d9ef69a3c31f3d3e]<br />
[ 30.657791][ T674] i2c_device_probe+0x37c/0x3c0<br />
...<br />
<br />
Initialize ssif_info->client before any error path can be taken. Clear<br />
i2c_client data in the error path to prevent the dangling pointer from<br />
leaking.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4 (including) | 5.4.169 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.89 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.16:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1f6ab847461ce7dd89ae9db2dd4658c993355d7c
- https://git.kernel.org/stable/c/34f35f8f14bc406efc06ee4ff73202c6fd245d15
- https://git.kernel.org/stable/c/77a7311ca167aa5b7055c549a940a56e73ee5f29
- https://git.kernel.org/stable/c/8efd6a3391f7b0b19fb0c38e50add06ca30c94af
- https://git.kernel.org/stable/c/1f6ab847461ce7dd89ae9db2dd4658c993355d7c
- https://git.kernel.org/stable/c/34f35f8f14bc406efc06ee4ff73202c6fd245d15
- https://git.kernel.org/stable/c/77a7311ca167aa5b7055c549a940a56e73ee5f29
- https://git.kernel.org/stable/c/8efd6a3391f7b0b19fb0c38e50add06ca30c94af



