CVE-2021-47457
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
22/05/2024
Last modified:
29/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible()<br />
<br />
Using wait_event_interruptible() to wait for complete transmission,<br />
but do not check the result of wait_event_interruptible() which can be<br />
interrupted. It will result in TX buffer has multiple accessors and<br />
the later process interferes with the previous process.<br />
<br />
Following is one of the problems reported by syzbot.<br />
<br />
=============================================================<br />
WARNING: CPU: 0 PID: 0 at net/can/isotp.c:840 isotp_tx_timer_handler+0x2e0/0x4c0<br />
CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.13.0-rc7+ #68<br />
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1 04/01/2014<br />
RIP: 0010:isotp_tx_timer_handler+0x2e0/0x4c0<br />
Call Trace:<br />
<br />
? isotp_setsockopt+0x390/0x390<br />
__hrtimer_run_queues+0xb8/0x610<br />
hrtimer_run_softirq+0x91/0xd0<br />
? rcu_read_lock_sched_held+0x4d/0x80<br />
__do_softirq+0xe8/0x553<br />
irq_exit_rcu+0xf8/0x100<br />
sysvec_apic_timer_interrupt+0x9e/0xc0<br />
<br />
asm_sysvec_apic_timer_interrupt+0x12/0x20<br />
<br />
Add result check for wait_event_interruptible() in isotp_sendmsg()<br />
to avoid multiple accessers for tx buffer.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10 (including) | 5.10.76 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.14.15 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/053bc12df0d6097c1126d0e14fa778a0a8faeb64
- https://git.kernel.org/stable/c/9acf636215a6ce9362fe618e7da4913b8bfe84c8
- https://git.kernel.org/stable/c/a76abedd2be3926d6deba236a935c7f98abf9110
- https://git.kernel.org/stable/c/053bc12df0d6097c1126d0e14fa778a0a8faeb64
- https://git.kernel.org/stable/c/9acf636215a6ce9362fe618e7da4913b8bfe84c8
- https://git.kernel.org/stable/c/a76abedd2be3926d6deba236a935c7f98abf9110



