CVE-2021-47434
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
22/05/2024
Last modified:
25/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
xhci: Fix command ring pointer corruption while aborting a command<br />
<br />
The command ring pointer is located at [6:63] bits of the command<br />
ring control register (CRCR). All the control bits like command stop,<br />
abort are located at [0:3] bits. While aborting a command, we read the<br />
CRCR and set the abort bit and write to the CRCR. The read will always<br />
give command ring pointer as all zeros. So we essentially write only<br />
the control bits. Since we split the 64 bit write into two 32 bit writes,<br />
there is a possibility of xHC command ring stopped before the upper<br />
dword (all zeros) is written. If that happens, xHC updates the upper<br />
dword of its internal command ring pointer with all zeros. Next time,<br />
when the command ring is restarted, we see xHC memory access failures.<br />
Fix this issue by only writing to the lower dword of CRCR where all<br />
control bits are located.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.14.252 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.213 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.155 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.75 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.14.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/01c2dcb67e71c351006dd17cbba86c26b7f61eaf
- https://git.kernel.org/stable/c/22bcb65ea41072ab5d03c0c6290e04e0df6d09a0
- https://git.kernel.org/stable/c/62c182b5e763e5f4062e72678e72ce3e02dd4d1b
- https://git.kernel.org/stable/c/dec944bb7079b37968cf69c8a438f91f15c4cc61
- https://git.kernel.org/stable/c/e54abefe703ab7c4e5983e889babd1447738ca42
- https://git.kernel.org/stable/c/ff0e50d3564f33b7f4b35cadeabd951d66cfc570
- https://git.kernel.org/stable/c/01c2dcb67e71c351006dd17cbba86c26b7f61eaf
- https://git.kernel.org/stable/c/22bcb65ea41072ab5d03c0c6290e04e0df6d09a0
- https://git.kernel.org/stable/c/62c182b5e763e5f4062e72678e72ce3e02dd4d1b
- https://git.kernel.org/stable/c/dec944bb7079b37968cf69c8a438f91f15c4cc61
- https://git.kernel.org/stable/c/e54abefe703ab7c4e5983e889babd1447738ca42
- https://git.kernel.org/stable/c/ff0e50d3564f33b7f4b35cadeabd951d66cfc570



