Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2021-47576
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-19 Jun, 2024 | 14:53
Updated At-04 May, 2025 | 07:14
Rejected At-
▼CVE Numbering Authority (CNA)
scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select()

In the Linux kernel, the following vulnerability has been resolved: scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() In resp_mode_select() sanity check the block descriptor len to avoid UAF. BUG: KASAN: use-after-free in resp_mode_select+0xa4c/0xb40 drivers/scsi/scsi_debug.c:2509 Read of size 1 at addr ffff888026670f50 by task scsicmd/15032 CPU: 1 PID: 15032 Comm: scsicmd Not tainted 5.15.0-01d0625 #15 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Call Trace: <TASK> dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:107 print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:257 kasan_report.cold.14+0x7d/0x117 mm/kasan/report.c:443 __asan_report_load1_noabort+0x14/0x20 mm/kasan/report_generic.c:306 resp_mode_select+0xa4c/0xb40 drivers/scsi/scsi_debug.c:2509 schedule_resp+0x4af/0x1a10 drivers/scsi/scsi_debug.c:5483 scsi_debug_queuecommand+0x8c9/0x1e70 drivers/scsi/scsi_debug.c:7537 scsi_queue_rq+0x16b4/0x2d10 drivers/scsi/scsi_lib.c:1521 blk_mq_dispatch_rq_list+0xb9b/0x2700 block/blk-mq.c:1640 __blk_mq_sched_dispatch_requests+0x28f/0x590 block/blk-mq-sched.c:325 blk_mq_sched_dispatch_requests+0x105/0x190 block/blk-mq-sched.c:358 __blk_mq_run_hw_queue+0xe5/0x150 block/blk-mq.c:1762 __blk_mq_delay_run_hw_queue+0x4f8/0x5c0 block/blk-mq.c:1839 blk_mq_run_hw_queue+0x18d/0x350 block/blk-mq.c:1891 blk_mq_sched_insert_request+0x3db/0x4e0 block/blk-mq-sched.c:474 blk_execute_rq_nowait+0x16b/0x1c0 block/blk-exec.c:63 sg_common_write.isra.18+0xeb3/0x2000 drivers/scsi/sg.c:837 sg_new_write.isra.19+0x570/0x8c0 drivers/scsi/sg.c:775 sg_ioctl_common+0x14d6/0x2710 drivers/scsi/sg.c:941 sg_ioctl+0xa2/0x180 drivers/scsi/sg.c:1166 __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:52 do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:50 entry_SYSCALL_64_after_hwframe+0x44/0xae arch/x86/entry/entry_64.S:113

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/scsi/scsi_debug.c
Default Status
unaffected
Versions
Affected
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before adcecd50da6cab7b4957cba0606771dcc846c5a9 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 90491283b4064220682e4b0687d07b05df01e3bf (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 04181973c38f3d6a353f9246dcf7fee08024fd9e (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before b847ecff850719c46c95acd25a0d555dfd16e10d (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before a9078e791426c2cbbdf28a320c3670f6e0a611e6 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before dfc3fff63793c571147930b13c0f8c689c4281ac (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before e0a2c28da11e2c2b963fc01d50acbf03045ac732 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/scsi/scsi_debug.c
Default Status
affected
Versions
Unaffected
  • From 4.9.294 through 4.9.* (semver)
  • From 4.14.259 through 4.14.* (semver)
  • From 4.19.222 through 4.19.* (semver)
  • From 5.4.168 through 5.4.* (semver)
  • From 5.10.88 through 5.10.* (semver)
  • From 5.15.11 through 5.15.* (semver)
  • From 5.16 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/adcecd50da6cab7b4957cba0606771dcc846c5a9
N/A
https://git.kernel.org/stable/c/90491283b4064220682e4b0687d07b05df01e3bf
N/A
https://git.kernel.org/stable/c/04181973c38f3d6a353f9246dcf7fee08024fd9e
N/A
https://git.kernel.org/stable/c/b847ecff850719c46c95acd25a0d555dfd16e10d
N/A
https://git.kernel.org/stable/c/a9078e791426c2cbbdf28a320c3670f6e0a611e6
N/A
https://git.kernel.org/stable/c/dfc3fff63793c571147930b13c0f8c689c4281ac
N/A
https://git.kernel.org/stable/c/e0a2c28da11e2c2b963fc01d50acbf03045ac732
N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/adcecd50da6cab7b4957cba0606771dcc846c5a9
x_transferred
https://git.kernel.org/stable/c/90491283b4064220682e4b0687d07b05df01e3bf
x_transferred
https://git.kernel.org/stable/c/04181973c38f3d6a353f9246dcf7fee08024fd9e
x_transferred
https://git.kernel.org/stable/c/b847ecff850719c46c95acd25a0d555dfd16e10d
x_transferred
https://git.kernel.org/stable/c/a9078e791426c2cbbdf28a320c3670f6e0a611e6
x_transferred
https://git.kernel.org/stable/c/dfc3fff63793c571147930b13c0f8c689c4281ac
x_transferred
https://git.kernel.org/stable/c/e0a2c28da11e2c2b963fc01d50acbf03045ac732
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found