CVE-2021-46963

In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() RIP: 0010:kmem_cache_free+0xfa/0x1b0 Call Trace: qla2xxx_mqueuecommand+0x2b5/0x2c0 [qla2xxx] scsi_queue_rq+0x5e2/0xa40 __blk_mq_try_issue_directly+0x128/0x1d0 blk_mq_request_issue_directly+0x4e/0xb0 Fix incorrect call to free srb in qla2xxx_mqueuecommand(), as srb is now allocated by upper layers. This fixes smatch warning of srb unintended free.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

11 Dec 2024, 16:12

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93 - () https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93 - Patch
References () https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538 - () https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538 - Patch
References () https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f - () https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f - Patch
References () https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56 - () https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56 - Patch
References () https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053 - () https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053 - Patch
References () https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89 - () https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93 - () https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93 -
References () https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538 - () https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538 -
References () https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f - () https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f -
References () https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56 - () https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56 -
References () https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053 - () https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053 -
References () https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89 - () https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89 -

28 Feb 2024, 14:06

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: qla2xxx: Soluciona falla en qla2xxx_mqueuecommand() RIP: 0010:kmem_cache_free+0xfa/0x1b0 Rastreo de llamadas: qla2xxx_mqueuecommand+0x2b5/0x2c0 [qla2xxx] scsi_queue_rq+0x5e2/0xa40 __blk_mq_try_issue_ directamente+0x128 /0x1d0 blk_mq_request_issue_directly+0x4e/0xb0 Se corrigió la llamada incorrecta para liberar srb en qla2xxx_mqueuecommand(), ya que srb ahora está asignado por capas superiores. Esto corrige la advertencia de srb gratuito no deseado.

27 Feb 2024, 19:04

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-27 19:04

Updated : 2024-12-11 16:12


NVD link : CVE-2021-46963

Mitre link : CVE-2021-46963

CVE.ORG link : CVE-2021-46963


JSON object : View

Products Affected

linux

  • linux_kernel