// For flags

CVE-2021-47434

xhci: Fix command ring pointer corruption while aborting a command

Severity Score

"-"
*CVSS v-

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

In the Linux kernel, the following vulnerability has been resolved:

xhci: Fix command ring pointer corruption while aborting a command

The command ring pointer is located at [6:63] bits of the command
ring control register (CRCR). All the control bits like command stop,
abort are located at [0:3] bits. While aborting a command, we read the
CRCR and set the abort bit and write to the CRCR. The read will always
give command ring pointer as all zeros. So we essentially write only
the control bits. Since we split the 64 bit write into two 32 bit writes,
there is a possibility of xHC command ring stopped before the upper
dword (all zeros) is written. If that happens, xHC updates the upper
dword of its internal command ring pointer with all zeros. Next time,
when the command ring is restarted, we see xHC memory access failures.
Fix this issue by only writing to the lower dword of CRCR where all
control bits are located.

En el kernel de Linux, se resolvió la siguiente vulnerabilidad: xhci: corrige la corrupción del puntero del anillo de comando al cancelar un comando. El puntero del anillo de comando está ubicado en los bits [6:63] del registro de control del anillo de comando (CRCR). Todos los bits de control, como el comando de parada y cancelación, se encuentran en bits [0:3]. Mientras abortamos un comando, leemos el CRCR, configuramos el bit de cancelación y escribimos en el CRCR. La lectura siempre dará un puntero de anillo de comando como todo ceros. Básicamente, escribimos sólo los bits de control. Dado que dividimos la escritura de 64 bits en dos escrituras de 32 bits, existe la posibilidad de que el anillo de comando xHC se detenga antes de que se escriba la palabra d superior (todo ceros). Si eso sucede, xHC actualiza la palabra clave superior de su puntero de anillo de comando interno con todo ceros. La próxima vez, cuando se reinicie el anillo de comando, veremos fallas de acceso a la memoria xHC. Solucione este problema escribiendo únicamente en la palabra clave inferior de CRCR donde se encuentran todos los bits de control.

*Credits: N/A
CVSS Scores
Attack Vector
-
Attack Complexity
-
Privileges Required
-
User Interaction
-
Scope
-
Confidentiality
-
Integrity
-
Availability
-
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-05-21 CVE Reserved
  • 2024-05-22 CVE Published
  • 2024-05-22 EPSS Updated
  • 2024-11-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
< 4.14.252
Search vendor "Linux" for product "Linux Kernel" and version " < 4.14.252"
en
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
< 4.19.213
Search vendor "Linux" for product "Linux Kernel" and version " < 4.19.213"
en
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
< 5.4.155
Search vendor "Linux" for product "Linux Kernel" and version " < 5.4.155"
en
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
< 5.10.75
Search vendor "Linux" for product "Linux Kernel" and version " < 5.10.75"
en
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
< 5.14.14
Search vendor "Linux" for product "Linux Kernel" and version " < 5.14.14"
en
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
< 5.15
Search vendor "Linux" for product "Linux Kernel" and version " < 5.15"
en
Affected