CVE-2021-47170
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/03/2024
Last modified:
17/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
USB: usbfs: Don&#39;t WARN about excessively large memory allocations<br />
<br />
Syzbot found that the kernel generates a WARNing if the user tries to<br />
submit a bulk transfer through usbfs with a buffer that is way too<br />
large. This isn&#39;t a bug in the kernel; it&#39;s merely an invalid request<br />
from the user and the usbfs code does handle it correctly.<br />
<br />
In theory the same thing can happen with async transfers, or with the<br />
packet descriptor table for isochronous transfers.<br />
<br />
To prevent the MM subsystem from complaining about these bad<br />
allocation requests, add the __GFP_NOWARN flag to the kmalloc calls<br />
for these buffers.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19.193 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.124 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.42 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.12.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2ab21d6e1411999b5fb43434f421f00bf50002eb
- https://git.kernel.org/stable/c/2c835fede13e03f2743a333e4370b5ed2db91e83
- https://git.kernel.org/stable/c/4f2629ea67e7225c3fd292c7fe4f5b3c9d6392de
- https://git.kernel.org/stable/c/8d83f109e920d2776991fa142bb904d985dca2ed
- https://git.kernel.org/stable/c/9f7cb3f01a10d9064cf13b3d26fb7e7a5827d098
- https://git.kernel.org/stable/c/2ab21d6e1411999b5fb43434f421f00bf50002eb
- https://git.kernel.org/stable/c/2c835fede13e03f2743a333e4370b5ed2db91e83
- https://git.kernel.org/stable/c/4f2629ea67e7225c3fd292c7fe4f5b3c9d6392de
- https://git.kernel.org/stable/c/8d83f109e920d2776991fa142bb904d985dca2ed
- https://git.kernel.org/stable/c/9f7cb3f01a10d9064cf13b3d26fb7e7a5827d098



