CVE-2021-47412
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/05/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
block: don&#39;t call rq_qos_ops->done_bio if the bio isn&#39;t tracked<br />
<br />
rq_qos framework is only applied on request based driver, so:<br />
<br />
1) rq_qos_done_bio() needn&#39;t to be called for bio based driver<br />
<br />
2) rq_qos_done_bio() needn&#39;t to be called for bio which isn&#39;t tracked,<br />
such as bios ended from error handling code.<br />
<br />
Especially in bio_endio():<br />
<br />
1) request queue is referred via bio->bi_bdev->bd_disk->queue, which<br />
may be gone since request queue refcount may not be held in above two<br />
cases<br />
<br />
2) q->rq_qos may be freed in blk_cleanup_queue() when calling into<br />
__rq_qos_done_bio()<br />
<br />
Fix the potential kernel panic by not calling rq_qos_ops->done_bio if<br />
the bio isn&#39;t tracked. This way is safe because both ioc_rqos_done_bio()<br />
and blkcg_iolatency_done_bio() are nop if the bio isn&#39;t tracked.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.241 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.14.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/004b8f8a691205a93d9e80d98b786b2b97424d6e
- https://git.kernel.org/stable/c/a647a524a46736786c95cdb553a070322ca096e3
- https://git.kernel.org/stable/c/db60edbfff332a6a5477c367af8125f034570989
- https://git.kernel.org/stable/c/004b8f8a691205a93d9e80d98b786b2b97424d6e
- https://git.kernel.org/stable/c/a647a524a46736786c95cdb553a070322ca096e3
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html



