CVE-2021-47434
xhci: Fix command ring pointer corruption while aborting a command
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In the Linux kernel, the following vulnerability has been resolved:
xhci: Fix command ring pointer corruption while aborting a command
The command ring pointer is located at [6:63] bits of the command
ring control register (CRCR). All the control bits like command stop,
abort are located at [0:3] bits. While aborting a command, we read the
CRCR and set the abort bit and write to the CRCR. The read will always
give command ring pointer as all zeros. So we essentially write only
the control bits. Since we split the 64 bit write into two 32 bit writes,
there is a possibility of xHC command ring stopped before the upper
dword (all zeros) is written. If that happens, xHC updates the upper
dword of its internal command ring pointer with all zeros. Next time,
when the command ring is restarted, we see xHC memory access failures.
Fix this issue by only writing to the lower dword of CRCR where all
control bits are located.
En el kernel de Linux, se resolvió la siguiente vulnerabilidad: xhci: corrige la corrupción del puntero del anillo de comando al cancelar un comando. El puntero del anillo de comando está ubicado en los bits [6:63] del registro de control del anillo de comando (CRCR). Todos los bits de control, como el comando de parada y cancelación, se encuentran en bits [0:3]. Mientras abortamos un comando, leemos el CRCR, configuramos el bit de cancelación y escribimos en el CRCR. La lectura siempre dará un puntero de anillo de comando como todo ceros. Básicamente, escribimos sólo los bits de control. Dado que dividimos la escritura de 64 bits en dos escrituras de 32 bits, existe la posibilidad de que el anillo de comando xHC se detenga antes de que se escriba la palabra d superior (todo ceros). Si eso sucede, xHC actualiza la palabra clave superior de su puntero de anillo de comando interno con todo ceros. La próxima vez, cuando se reinicie el anillo de comando, veremos fallas de acceso a la memoria xHC. Solucione este problema escribiendo únicamente en la palabra clave inferior de CRCR donde se encuentran todos los bits de control.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-05-21 CVE Reserved
- 2024-05-22 CVE Published
- 2024-05-22 EPSS Updated
- 2024-11-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (6)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 4.14.252 Search vendor "Linux" for product "Linux Kernel" and version " < 4.14.252" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 4.19.213 Search vendor "Linux" for product "Linux Kernel" and version " < 4.19.213" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 5.4.155 Search vendor "Linux" for product "Linux Kernel" and version " < 5.4.155" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 5.10.75 Search vendor "Linux" for product "Linux Kernel" and version " < 5.10.75" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 5.14.14 Search vendor "Linux" for product "Linux Kernel" and version " < 5.14.14" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 5.15 Search vendor "Linux" for product "Linux Kernel" and version " < 5.15" | en |
Affected
|