cve-2021-47205
Vulnerability from cvelistv5
Published
2024-04-10 18:56
Modified
2024-11-04 12:01
Severity ?
Summary
clk: sunxi-ng: Unregister clocks/resets when unbinding
Impacted products
Vendor Product Version
Linux Linux
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-47205",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-12T16:35:34.459047Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:13:34.061Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:32:07.375Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/b5dd513daa70ee8f6d281a20bd28485ee9bb7db2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/9bec2b9c6134052994115d2d3374e96f2ccb9b9d"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/clk/sunxi-ng/ccu-sun4i-a10.c",
            "drivers/clk/sunxi-ng/ccu-sun50i-a100-r.c",
            "drivers/clk/sunxi-ng/ccu-sun50i-a100.c",
            "drivers/clk/sunxi-ng/ccu-sun50i-a64.c",
            "drivers/clk/sunxi-ng/ccu-sun50i-h6-r.c",
            "drivers/clk/sunxi-ng/ccu-sun50i-h6.c",
            "drivers/clk/sunxi-ng/ccu-sun50i-h616.c",
            "drivers/clk/sunxi-ng/ccu-sun5i.c",
            "drivers/clk/sunxi-ng/ccu-sun6i-a31.c",
            "drivers/clk/sunxi-ng/ccu-sun8i-a23.c",
            "drivers/clk/sunxi-ng/ccu-sun8i-a33.c",
            "drivers/clk/sunxi-ng/ccu-sun8i-a83t.c",
            "drivers/clk/sunxi-ng/ccu-sun8i-de2.c",
            "drivers/clk/sunxi-ng/ccu-sun8i-h3.c",
            "drivers/clk/sunxi-ng/ccu-sun8i-r.c",
            "drivers/clk/sunxi-ng/ccu-sun8i-r40.c",
            "drivers/clk/sunxi-ng/ccu-sun8i-v3s.c",
            "drivers/clk/sunxi-ng/ccu-sun9i-a80-de.c",
            "drivers/clk/sunxi-ng/ccu-sun9i-a80-usb.c",
            "drivers/clk/sunxi-ng/ccu-sun9i-a80.c",
            "drivers/clk/sunxi-ng/ccu-suniv-f1c100s.c",
            "drivers/clk/sunxi-ng/ccu_common.c",
            "drivers/clk/sunxi-ng/ccu_common.h"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "b5dd513daa70",
              "status": "affected",
              "version": "1da177e4c3f4",
              "versionType": "git"
            },
            {
              "lessThan": "9bec2b9c6134",
              "status": "affected",
              "version": "1da177e4c3f4",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/clk/sunxi-ng/ccu-sun4i-a10.c",
            "drivers/clk/sunxi-ng/ccu-sun50i-a100-r.c",
            "drivers/clk/sunxi-ng/ccu-sun50i-a100.c",
            "drivers/clk/sunxi-ng/ccu-sun50i-a64.c",
            "drivers/clk/sunxi-ng/ccu-sun50i-h6-r.c",
            "drivers/clk/sunxi-ng/ccu-sun50i-h6.c",
            "drivers/clk/sunxi-ng/ccu-sun50i-h616.c",
            "drivers/clk/sunxi-ng/ccu-sun5i.c",
            "drivers/clk/sunxi-ng/ccu-sun6i-a31.c",
            "drivers/clk/sunxi-ng/ccu-sun8i-a23.c",
            "drivers/clk/sunxi-ng/ccu-sun8i-a33.c",
            "drivers/clk/sunxi-ng/ccu-sun8i-a83t.c",
            "drivers/clk/sunxi-ng/ccu-sun8i-de2.c",
            "drivers/clk/sunxi-ng/ccu-sun8i-h3.c",
            "drivers/clk/sunxi-ng/ccu-sun8i-r.c",
            "drivers/clk/sunxi-ng/ccu-sun8i-r40.c",
            "drivers/clk/sunxi-ng/ccu-sun8i-v3s.c",
            "drivers/clk/sunxi-ng/ccu-sun9i-a80-de.c",
            "drivers/clk/sunxi-ng/ccu-sun9i-a80-usb.c",
            "drivers/clk/sunxi-ng/ccu-sun9i-a80.c",
            "drivers/clk/sunxi-ng/ccu-suniv-f1c100s.c",
            "drivers/clk/sunxi-ng/ccu_common.c",
            "drivers/clk/sunxi-ng/ccu_common.h"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.16",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: sunxi-ng: Unregister clocks/resets when unbinding\n\nCurrently, unbinding a CCU driver unmaps the device\u0027s MMIO region, while\nleaving its clocks/resets and their providers registered. This can cause\na page fault later when some clock operation tries to perform MMIO. Fix\nthis by separating the CCU initialization from the memory allocation,\nand then using a devres callback to unregister the clocks and resets.\n\nThis also fixes a memory leak of the `struct ccu_reset`, and uses the\ncorrect owner (the specific platform driver) for the clocks and resets.\n\nEarly OF clock providers are never unregistered, and limited error\nhandling is possible, so they are mostly unchanged. The error reporting\nis made more consistent by moving the message inside of_sunxi_ccu_probe."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-04T12:01:29.961Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/b5dd513daa70ee8f6d281a20bd28485ee9bb7db2"
        },
        {
          "url": "https://git.kernel.org/stable/c/9bec2b9c6134052994115d2d3374e96f2ccb9b9d"
        }
      ],
      "title": "clk: sunxi-ng: Unregister clocks/resets when unbinding",
      "x_generator": {
        "engine": "bippy-9e1c9544281a"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2021-47205",
    "datePublished": "2024-04-10T18:56:38.347Z",
    "dateReserved": "2024-03-25T09:12:14.117Z",
    "dateUpdated": "2024-11-04T12:01:29.961Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-47205\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-04-10T19:15:48.310\",\"lastModified\":\"2024-11-21T06:35:37.577\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nclk: sunxi-ng: Unregister clocks/resets when unbinding\\n\\nCurrently, unbinding a CCU driver unmaps the device\u0027s MMIO region, while\\nleaving its clocks/resets and their providers registered. This can cause\\na page fault later when some clock operation tries to perform MMIO. Fix\\nthis by separating the CCU initialization from the memory allocation,\\nand then using a devres callback to unregister the clocks and resets.\\n\\nThis also fixes a memory leak of the `struct ccu_reset`, and uses the\\ncorrect owner (the specific platform driver) for the clocks and resets.\\n\\nEarly OF clock providers are never unregistered, and limited error\\nhandling is possible, so they are mostly unchanged. The error reporting\\nis made more consistent by moving the message inside of_sunxi_ccu_probe.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: sunxi-ng: Anular el registro de relojes/reinicios al desvincular Actualmente, desvincular un controlador CCU anula la asignaci\u00f3n de la regi\u00f3n MMIO del dispositivo, mientras que deja sus relojes/reinicios y sus proveedores registrados. Esto puede causar una falla de p\u00e1gina m\u00e1s adelante cuando alguna operaci\u00f3n de reloj intenta realizar MMIO. Solucione esto separando la inicializaci\u00f3n de CCU de la asignaci\u00f3n de memoria y luego usando una devoluci\u00f3n de llamada devres para anular el registro de los relojes y reinicios. Esto tambi\u00e9n corrige una p\u00e9rdida de memoria de `struct ccu_reset` y usa el propietario correcto (el controlador de plataforma espec\u00edfico) para los relojes y reinicios. Los primeros proveedores de reloj OF nunca se anulan del registro y es posible un manejo de errores limitado, por lo que en su mayor\u00eda no se modifican. El informe de errores se hace m\u00e1s consistente moviendo el mensaje dentro de of_sunxi_ccu_probe.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/9bec2b9c6134052994115d2d3374e96f2ccb9b9d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b5dd513daa70ee8f6d281a20bd28485ee9bb7db2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9bec2b9c6134052994115d2d3374e96f2ccb9b9d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/b5dd513daa70ee8f6d281a20bd28485ee9bb7db2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.