Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2021-47005
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-28 Feb, 2024 | 08:13
Updated At-04 May, 2025 | 07:02
Rejected At-
▼CVE Numbering Authority (CNA)
PCI: endpoint: Fix NULL pointer dereference for ->get_features()

In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: Fix NULL pointer dereference for ->get_features() get_features ops of pci_epc_ops may return NULL, causing NULL pointer dereference in pci_epf_test_alloc_space function. Let us add a check for pci_epc_feature pointer in pci_epf_test_bind before we access it to avoid any such NULL pointer dereference and return -ENOTSUPP in case pci_epc_feature is not found. When the patch is not applied and EPC features is not implemented in the platform driver, we see the following dump due to kernel NULL pointer dereference. Call trace: pci_epf_test_bind+0xf4/0x388 pci_epf_bind+0x3c/0x80 pci_epc_epf_link+0xa8/0xcc configfs_symlink+0x1a4/0x48c vfs_symlink+0x104/0x184 do_symlinkat+0x80/0xd4 __arm64_sys_symlinkat+0x1c/0x24 el0_svc_common.constprop.3+0xb8/0x170 el0_svc_handler+0x70/0x88 el0_svc+0x8/0x640 Code: d2800581 b9403ab9 f9404ebb 8b394f60 (f9400400) ---[ end trace a438e3c5a24f9df0 ]---

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/pci/endpoint/functions/pci-epf-test.c
Default Status
unaffected
Versions
Affected
  • From 2c04c5b8eef797dca99699cfb55ff42dd3c12c23 before bbed83d7060e07a5d309104d25a00f0a24441428 (git)
  • From 2c04c5b8eef797dca99699cfb55ff42dd3c12c23 before 679ebad058b8168f10e63876d63b0877fd2fe784 (git)
  • From 2c04c5b8eef797dca99699cfb55ff42dd3c12c23 before 0169d4f0bee44fdfef908c13ed21fcb326c38695 (git)
  • From 2c04c5b8eef797dca99699cfb55ff42dd3c12c23 before 6613bc2301ba291a1c5a90e1dc24cf3edf223c03 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/pci/endpoint/functions/pci-epf-test.c
Default Status
affected
Versions
Affected
  • 5.1
Unaffected
  • From 0 before 5.1 (semver)
  • From 5.10.38 through 5.10.* (semver)
  • From 5.11.22 through 5.11.* (semver)
  • From 5.12.5 through 5.12.* (semver)
  • From 5.13 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/bbed83d7060e07a5d309104d25a00f0a24441428
N/A
https://git.kernel.org/stable/c/679ebad058b8168f10e63876d63b0877fd2fe784
N/A
https://git.kernel.org/stable/c/0169d4f0bee44fdfef908c13ed21fcb326c38695
N/A
https://git.kernel.org/stable/c/6613bc2301ba291a1c5a90e1dc24cf3edf223c03
N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/bbed83d7060e07a5d309104d25a00f0a24441428
x_transferred
https://git.kernel.org/stable/c/679ebad058b8168f10e63876d63b0877fd2fe784
x_transferred
https://git.kernel.org/stable/c/0169d4f0bee44fdfef908c13ed21fcb326c38695
x_transferred
https://git.kernel.org/stable/c/6613bc2301ba291a1c5a90e1dc24cf3edf223c03
x_transferred
Details not found