CVE-2021-47297
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/05/2024
Last modified:
02/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: fix uninit-value in caif_seqpkt_sendmsg<br />
<br />
When nr_segs equal to zero in iovec_from_user, the object<br />
msg->msg_iter.iov is uninit stack memory in caif_seqpkt_sendmsg<br />
which is defined in ___sys_sendmsg. So we cann&#39;t just judge<br />
msg->msg_iter.iov->base directlly. We can use nr_segs to judge<br />
msg in caif_seqpkt_sendmsg whether has data buffers.<br />
<br />
=====================================================<br />
BUG: KMSAN: uninit-value in caif_seqpkt_sendmsg+0x693/0xf60 net/caif/caif_socket.c:542<br />
Call Trace:<br />
__dump_stack lib/dump_stack.c:77 [inline]<br />
dump_stack+0x1c9/0x220 lib/dump_stack.c:118<br />
kmsan_report+0xf7/0x1e0 mm/kmsan/kmsan_report.c:118<br />
__msan_warning+0x58/0xa0 mm/kmsan/kmsan_instr.c:215<br />
caif_seqpkt_sendmsg+0x693/0xf60 net/caif/caif_socket.c:542<br />
sock_sendmsg_nosec net/socket.c:652 [inline]<br />
sock_sendmsg net/socket.c:672 [inline]<br />
____sys_sendmsg+0x12b6/0x1350 net/socket.c:2343<br />
___sys_sendmsg net/socket.c:2397 [inline]<br />
__sys_sendmmsg+0x808/0xc90 net/socket.c:2480<br />
__compat_sys_sendmmsg net/compat.c:656 [inline]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.35 (including) | 4.4.277 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.5 (including) | 4.9.277 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 4.14.241 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.199 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.136 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.54 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.13.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1582a02fecffcee306663035a295e28e1c4aaaff
- https://git.kernel.org/stable/c/452c3ed7bf63721b07bc2238ed1261bb26027e85
- https://git.kernel.org/stable/c/5c6d8e2f7187b8e45a18c27acb7a3885f03ee3db
- https://git.kernel.org/stable/c/9413c0abb57f70a953b1116318d6aa478013c35d
- https://git.kernel.org/stable/c/991e634360f2622a683b48dfe44fe6d9cb765a09
- https://git.kernel.org/stable/c/d4c7797ab1517515f0d08b3bc1c6b48883889c54
- https://git.kernel.org/stable/c/d9d646acad2c3590e189bb5d5c86ab8bd8a2dfc3
- https://git.kernel.org/stable/c/ffe31dd70b70a40cd6b21b78c1713a23e021843a
- https://git.kernel.org/stable/c/1582a02fecffcee306663035a295e28e1c4aaaff
- https://git.kernel.org/stable/c/452c3ed7bf63721b07bc2238ed1261bb26027e85
- https://git.kernel.org/stable/c/5c6d8e2f7187b8e45a18c27acb7a3885f03ee3db
- https://git.kernel.org/stable/c/9413c0abb57f70a953b1116318d6aa478013c35d
- https://git.kernel.org/stable/c/991e634360f2622a683b48dfe44fe6d9cb765a09
- https://git.kernel.org/stable/c/d4c7797ab1517515f0d08b3bc1c6b48883889c54
- https://git.kernel.org/stable/c/d9d646acad2c3590e189bb5d5c86ab8bd8a2dfc3
- https://git.kernel.org/stable/c/ffe31dd70b70a40cd6b21b78c1713a23e021843a



