CVE-2021-47170

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/03/2024
Last modified:
17/03/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> USB: usbfs: Don&amp;#39;t WARN about excessively large memory allocations<br /> <br /> Syzbot found that the kernel generates a WARNing if the user tries to<br /> submit a bulk transfer through usbfs with a buffer that is way too<br /> large. This isn&amp;#39;t a bug in the kernel; it&amp;#39;s merely an invalid request<br /> from the user and the usbfs code does handle it correctly.<br /> <br /> In theory the same thing can happen with async transfers, or with the<br /> packet descriptor table for isochronous transfers.<br /> <br /> To prevent the MM subsystem from complaining about these bad<br /> allocation requests, add the __GFP_NOWARN flag to the kmalloc calls<br /> for these buffers.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.19.193 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.124 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.42 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.12.9 (excluding)
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*