CVE-2021-46960

In the Linux kernel, the following vulnerability has been resolved: cifs: Return correct error code from smb2_get_enc_key Avoid a warning if the error percolates back up: [440700.376476] CIFS VFS: \\otters.example.com crypt_message: Could not get encryption key [440700.386947] ------------[ cut here ]------------ [440700.386948] err = 1 [440700.386977] WARNING: CPU: 11 PID: 2733 at /build/linux-hwe-5.4-p6lk6L/linux-hwe-5.4-5.4.0/lib/errseq.c:74 errseq_set+0x5c/0x70 ... [440700.397304] CPU: 11 PID: 2733 Comm: tar Tainted: G OE 5.4.0-70-generic #78~18.04.1-Ubuntu ... [440700.397334] Call Trace: [440700.397346] __filemap_set_wb_err+0x1a/0x70 [440700.397419] cifs_writepages+0x9c7/0xb30 [cifs] [440700.397426] do_writepages+0x4b/0xe0 [440700.397444] __filemap_fdatawrite_range+0xcb/0x100 [440700.397455] filemap_write_and_wait+0x42/0xa0 [440700.397486] cifs_setattr+0x68b/0xf30 [cifs] [440700.397493] notify_change+0x358/0x4a0 [440700.397500] utimes_common+0xe9/0x1c0 [440700.397510] do_utimes+0xc5/0x150 [440700.397520] __x64_sys_utimensat+0x88/0xd0
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

11 Dec 2024, 14:47

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/83728cbf366e334301091d5b808add468ab46b27 - () https://git.kernel.org/stable/c/83728cbf366e334301091d5b808add468ab46b27 - Patch
References () https://git.kernel.org/stable/c/93f3339b22ba17e66f0808737467b70ba087eaec - () https://git.kernel.org/stable/c/93f3339b22ba17e66f0808737467b70ba087eaec - Patch
References () https://git.kernel.org/stable/c/aaa0faa5c28a91c362352d6b35dc3ed10df56fb0 - () https://git.kernel.org/stable/c/aaa0faa5c28a91c362352d6b35dc3ed10df56fb0 - Patch
References () https://git.kernel.org/stable/c/b399c1a3ea0b9d10047ff266d65533df7f15532f - () https://git.kernel.org/stable/c/b399c1a3ea0b9d10047ff266d65533df7f15532f - Patch
References () https://git.kernel.org/stable/c/e486f8397f3f14a7cadc166138141fdb14379a54 - () https://git.kernel.org/stable/c/e486f8397f3f14a7cadc166138141fdb14379a54 - Patch
References () https://git.kernel.org/stable/c/e94851629c49c65b4fbb29a5725ddfd7988f8f20 - () https://git.kernel.org/stable/c/e94851629c49c65b4fbb29a5725ddfd7988f8f20 - Patch
References () https://git.kernel.org/stable/c/f59a9242942fef0de7b926e438ba4eae65d4b4dd - () https://git.kernel.org/stable/c/f59a9242942fef0de7b926e438ba4eae65d4b4dd - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CWE NVD-CWE-noinfo

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/83728cbf366e334301091d5b808add468ab46b27 - () https://git.kernel.org/stable/c/83728cbf366e334301091d5b808add468ab46b27 -
References () https://git.kernel.org/stable/c/93f3339b22ba17e66f0808737467b70ba087eaec - () https://git.kernel.org/stable/c/93f3339b22ba17e66f0808737467b70ba087eaec -
References () https://git.kernel.org/stable/c/aaa0faa5c28a91c362352d6b35dc3ed10df56fb0 - () https://git.kernel.org/stable/c/aaa0faa5c28a91c362352d6b35dc3ed10df56fb0 -
References () https://git.kernel.org/stable/c/b399c1a3ea0b9d10047ff266d65533df7f15532f - () https://git.kernel.org/stable/c/b399c1a3ea0b9d10047ff266d65533df7f15532f -
References () https://git.kernel.org/stable/c/e486f8397f3f14a7cadc166138141fdb14379a54 - () https://git.kernel.org/stable/c/e486f8397f3f14a7cadc166138141fdb14379a54 -
References () https://git.kernel.org/stable/c/e94851629c49c65b4fbb29a5725ddfd7988f8f20 - () https://git.kernel.org/stable/c/e94851629c49c65b4fbb29a5725ddfd7988f8f20 -
References () https://git.kernel.org/stable/c/f59a9242942fef0de7b926e438ba4eae65d4b4dd - () https://git.kernel.org/stable/c/f59a9242942fef0de7b926e438ba4eae65d4b4dd -

28 Feb 2024, 14:06

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: devuelve el código de error correcto de smb2_get_enc_key Evite una advertencia si el error se repite: [440700.376476] CIFS VFS: \\otters.example.com crypt_message: no se pudo obtener la clave de cifrado [440700.386947] ------------[ cortar aquí ]------------ [440700.386948] err = 1 [440700.386977] ADVERTENCIA: CPU: 11 PID: 2733 en / build/linux-hwe-5.4-p6lk6L/linux-hwe-5.4-5.4.0/lib/errseq.c:74 errseq_set+0x5c/0x70 ... [440700.397304] CPU: 11 PID: 2733 Comm: tar Contaminado: G OE 5.4.0-70-generic #78~18.04.1-Ubuntu... [440700.397334] Seguimiento de llamadas: [440700.397346] __filemap_set_wb_err+0x1a/0x70 [440700.397419] cifs_writepages+0x9c7/0xb30 [cifs ] [440700.397426] do_writepages+0x4b /0xe0 [440700.397444] __filemap_fdatawrite_range+0xcb/0x100 [440700.397455] filemap_write_and_wait+0x42/0xa0 [440700.397486] cifs_setattr+0x68b/0xf30 [cifs] [440700.39749 3] notify_change+0x358/0x4a0 [440700.397500] utimes_common+0xe9/0x1c0 [440700.397510] do_utimes+ 0xc5/0x150 [440700.397520] __x64_sys_utimensat+0x88/0xd0

27 Feb 2024, 19:04

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-27 19:04

Updated : 2024-12-11 14:47


NVD link : CVE-2021-46960

Mitre link : CVE-2021-46960

CVE.ORG link : CVE-2021-46960


JSON object : View

Products Affected

linux

  • linux_kernel