RHBA-2022:3893
Vulnerability from csaf_redhat - Published: 2022-05-17 13:12 - Updated: 2024-12-12 15:53In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Return CQE error if invalid lkey was supplied RXE is missing update of WQE status in LOCAL_WRITE failures. This caused the following kernel panic if someone sent an atomic operation with an explicitly wrong lkey. [leonro@vm ~]$ mkt test test_atomic_invalid_lkey (tests.test_atomic.AtomicTest) ... WARNING: CPU: 5 PID: 263 at drivers/infiniband/sw/rxe/rxe_comp.c:740 rxe_completer+0x1a6d/0x2e30 [rdma_rxe] Modules linked in: crc32_generic rdma_rxe ip6_udp_tunnel udp_tunnel rdma_ucm rdma_cm ib_umad ib_ipoib iw_cm ib_cm mlx5_ib ib_uverbs ib_core mlx5_core ptp pps_core CPU: 5 PID: 263 Comm: python3 Not tainted 5.13.0-rc1+ #2936 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 RIP: 0010:rxe_completer+0x1a6d/0x2e30 [rdma_rxe] Code: 03 0f 8e 65 0e 00 00 3b 93 10 06 00 00 0f 84 82 0a 00 00 4c 89 ff 4c 89 44 24 38 e8 2d 74 a9 e1 4c 8b 44 24 38 e9 1c f5 ff ff <0f> 0b e9 0c e8 ff ff b8 05 00 00 00 41 bf 05 00 00 00 e9 ab e7 ff RSP: 0018:ffff8880158af090 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff888016a78000 RCX: ffffffffa0cf1652 RDX: 1ffff9200004b442 RSI: 0000000000000004 RDI: ffffc9000025a210 RBP: dffffc0000000000 R08: 00000000ffffffea R09: ffff88801617740b R10: ffffed1002c2ee81 R11: 0000000000000007 R12: ffff88800f3b63e8 R13: ffff888016a78008 R14: ffffc9000025a180 R15: 000000000000000c FS: 00007f88b622a740(0000) GS:ffff88806d540000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f88b5a1fa10 CR3: 000000000d848004 CR4: 0000000000370ea0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rxe_do_task+0x130/0x230 [rdma_rxe] rxe_rcv+0xb11/0x1df0 [rdma_rxe] rxe_loopback+0x157/0x1e0 [rdma_rxe] rxe_responder+0x5532/0x7620 [rdma_rxe] rxe_do_task+0x130/0x230 [rdma_rxe] rxe_rcv+0x9c8/0x1df0 [rdma_rxe] rxe_loopback+0x157/0x1e0 [rdma_rxe] rxe_requester+0x1efd/0x58c0 [rdma_rxe] rxe_do_task+0x130/0x230 [rdma_rxe] rxe_post_send+0x998/0x1860 [rdma_rxe] ib_uverbs_post_send+0xd5f/0x1220 [ib_uverbs] ib_uverbs_write+0x847/0xc80 [ib_uverbs] vfs_write+0x1c5/0x840 ksys_write+0x176/0x1d0 do_syscall_64+0x3f/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xae
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "New redhat-release packages are available for Red Hat Enterprise Linux 9.",
"title": "Topic"
},
{
"category": "general",
"text": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.0 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2022:3893",
"url": "https://access.redhat.com/errata/RHBA-2022:3893"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.0_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.0_release_notes/index"
},
{
"category": "external",
"summary": "1997061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997061"
},
{
"category": "external",
"summary": "2001783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001783"
},
{
"category": "external",
"summary": "2002496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2002496"
},
{
"category": "external",
"summary": "2005552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005552"
},
{
"category": "external",
"summary": "2011240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011240"
},
{
"category": "external",
"summary": "2013299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013299"
},
{
"category": "external",
"summary": "2022717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022717"
},
{
"category": "external",
"summary": "2024610",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024610"
},
{
"category": "external",
"summary": "2031998",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031998"
},
{
"category": "external",
"summary": "2049627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049627"
},
{
"category": "external",
"summary": "2057686",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057686"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhba-2022_3893.json"
}
],
"title": "Red Hat Bug Fix Advisory: new packages: redhat-release",
"tracking": {
"current_release_date": "2024-12-12T15:53:52+00:00",
"generator": {
"date": "2024-12-12T15:53:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHBA-2022:3893",
"initial_release_date": "2022-05-17T13:12:16+00:00",
"revision_history": [
{
"date": "2022-05-17T13:12:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-17T13:12:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-12T15:53:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-sb-certs-0:9.0-2.17.el9.noarch",
"product": {
"name": "redhat-sb-certs-0:9.0-2.17.el9.noarch",
"product_id": "redhat-sb-certs-0:9.0-2.17.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-sb-certs@9.0-2.17.el9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-0:9.0-2.17.el9.src",
"product": {
"name": "redhat-release-0:9.0-2.17.el9.src",
"product_id": "redhat-release-0:9.0-2.17.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release@9.0-2.17.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-0:9.0-2.17.el9.aarch64",
"product": {
"name": "redhat-release-0:9.0-2.17.el9.aarch64",
"product_id": "redhat-release-0:9.0-2.17.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release@9.0-2.17.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-eula-0:9.0-2.17.el9.aarch64",
"product": {
"name": "redhat-release-eula-0:9.0-2.17.el9.aarch64",
"product_id": "redhat-release-eula-0:9.0-2.17.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-eula@9.0-2.17.el9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-0:9.0-2.17.el9.ppc64le",
"product": {
"name": "redhat-release-0:9.0-2.17.el9.ppc64le",
"product_id": "redhat-release-0:9.0-2.17.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release@9.0-2.17.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "redhat-release-eula-0:9.0-2.17.el9.ppc64le",
"product": {
"name": "redhat-release-eula-0:9.0-2.17.el9.ppc64le",
"product_id": "redhat-release-eula-0:9.0-2.17.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-eula@9.0-2.17.el9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-0:9.0-2.17.el9.x86_64",
"product": {
"name": "redhat-release-0:9.0-2.17.el9.x86_64",
"product_id": "redhat-release-0:9.0-2.17.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release@9.0-2.17.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-eula-0:9.0-2.17.el9.x86_64",
"product": {
"name": "redhat-release-eula-0:9.0-2.17.el9.x86_64",
"product_id": "redhat-release-eula-0:9.0-2.17.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-eula@9.0-2.17.el9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-0:9.0-2.17.el9.s390x",
"product": {
"name": "redhat-release-0:9.0-2.17.el9.s390x",
"product_id": "redhat-release-0:9.0-2.17.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release@9.0-2.17.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "redhat-release-eula-0:9.0-2.17.el9.s390x",
"product": {
"name": "redhat-release-eula-0:9.0-2.17.el9.s390x",
"product_id": "redhat-release-eula-0:9.0-2.17.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-eula@9.0-2.17.el9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-0:9.0-2.17.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.aarch64"
},
"product_reference": "redhat-release-0:9.0-2.17.el9.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-0:9.0-2.17.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.ppc64le"
},
"product_reference": "redhat-release-0:9.0-2.17.el9.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-0:9.0-2.17.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.s390x"
},
"product_reference": "redhat-release-0:9.0-2.17.el9.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-0:9.0-2.17.el9.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.src"
},
"product_reference": "redhat-release-0:9.0-2.17.el9.src",
"relates_to_product_reference": "BaseOS-9.0.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-0:9.0-2.17.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.x86_64"
},
"product_reference": "redhat-release-0:9.0-2.17.el9.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-eula-0:9.0-2.17.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.aarch64"
},
"product_reference": "redhat-release-eula-0:9.0-2.17.el9.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-eula-0:9.0-2.17.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.ppc64le"
},
"product_reference": "redhat-release-eula-0:9.0-2.17.el9.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-eula-0:9.0-2.17.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.s390x"
},
"product_reference": "redhat-release-eula-0:9.0-2.17.el9.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-eula-0:9.0-2.17.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.x86_64"
},
"product_reference": "redhat-release-eula-0:9.0-2.17.el9.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-sb-certs-0:9.0-2.17.el9.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.GA:redhat-sb-certs-0:9.0-2.17.el9.noarch"
},
"product_reference": "redhat-sb-certs-0:9.0-2.17.el9.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-0:9.0-2.17.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.aarch64"
},
"product_reference": "redhat-release-0:9.0-2.17.el9.aarch64",
"relates_to_product_reference": "CRB-9.0.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-0:9.0-2.17.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.ppc64le"
},
"product_reference": "redhat-release-0:9.0-2.17.el9.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-0:9.0-2.17.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.s390x"
},
"product_reference": "redhat-release-0:9.0-2.17.el9.s390x",
"relates_to_product_reference": "CRB-9.0.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-0:9.0-2.17.el9.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.src"
},
"product_reference": "redhat-release-0:9.0-2.17.el9.src",
"relates_to_product_reference": "CRB-9.0.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-0:9.0-2.17.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.x86_64"
},
"product_reference": "redhat-release-0:9.0-2.17.el9.x86_64",
"relates_to_product_reference": "CRB-9.0.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-eula-0:9.0-2.17.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.aarch64"
},
"product_reference": "redhat-release-eula-0:9.0-2.17.el9.aarch64",
"relates_to_product_reference": "CRB-9.0.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-eula-0:9.0-2.17.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.ppc64le"
},
"product_reference": "redhat-release-eula-0:9.0-2.17.el9.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-eula-0:9.0-2.17.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.s390x"
},
"product_reference": "redhat-release-eula-0:9.0-2.17.el9.s390x",
"relates_to_product_reference": "CRB-9.0.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-eula-0:9.0-2.17.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.x86_64"
},
"product_reference": "redhat-release-eula-0:9.0-2.17.el9.x86_64",
"relates_to_product_reference": "CRB-9.0.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-sb-certs-0:9.0-2.17.el9.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.GA:redhat-sb-certs-0:9.0-2.17.el9.noarch"
},
"product_reference": "redhat-sb-certs-0:9.0-2.17.el9.noarch",
"relates_to_product_reference": "CRB-9.0.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-47076",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-03-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267525"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Return CQE error if invalid lkey was supplied\n\nRXE is missing update of WQE status in LOCAL_WRITE failures. This caused\nthe following kernel panic if someone sent an atomic operation with an\nexplicitly wrong lkey.\n\n[leonro@vm ~]$ mkt test\ntest_atomic_invalid_lkey (tests.test_atomic.AtomicTest) ...\n WARNING: CPU: 5 PID: 263 at drivers/infiniband/sw/rxe/rxe_comp.c:740 rxe_completer+0x1a6d/0x2e30 [rdma_rxe]\n Modules linked in: crc32_generic rdma_rxe ip6_udp_tunnel udp_tunnel rdma_ucm rdma_cm ib_umad ib_ipoib iw_cm ib_cm mlx5_ib ib_uverbs ib_core mlx5_core ptp pps_core\n CPU: 5 PID: 263 Comm: python3 Not tainted 5.13.0-rc1+ #2936\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n RIP: 0010:rxe_completer+0x1a6d/0x2e30 [rdma_rxe]\n Code: 03 0f 8e 65 0e 00 00 3b 93 10 06 00 00 0f 84 82 0a 00 00 4c 89 ff 4c 89 44 24 38 e8 2d 74 a9 e1 4c 8b 44 24 38 e9 1c f5 ff ff \u003c0f\u003e 0b e9 0c e8 ff ff b8 05 00 00 00 41 bf 05 00 00 00 e9 ab e7 ff\n RSP: 0018:ffff8880158af090 EFLAGS: 00010246\n RAX: 0000000000000000 RBX: ffff888016a78000 RCX: ffffffffa0cf1652\n RDX: 1ffff9200004b442 RSI: 0000000000000004 RDI: ffffc9000025a210\n RBP: dffffc0000000000 R08: 00000000ffffffea R09: ffff88801617740b\n R10: ffffed1002c2ee81 R11: 0000000000000007 R12: ffff88800f3b63e8\n R13: ffff888016a78008 R14: ffffc9000025a180 R15: 000000000000000c\n FS: 00007f88b622a740(0000) GS:ffff88806d540000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f88b5a1fa10 CR3: 000000000d848004 CR4: 0000000000370ea0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n rxe_do_task+0x130/0x230 [rdma_rxe]\n rxe_rcv+0xb11/0x1df0 [rdma_rxe]\n rxe_loopback+0x157/0x1e0 [rdma_rxe]\n rxe_responder+0x5532/0x7620 [rdma_rxe]\n rxe_do_task+0x130/0x230 [rdma_rxe]\n rxe_rcv+0x9c8/0x1df0 [rdma_rxe]\n rxe_loopback+0x157/0x1e0 [rdma_rxe]\n rxe_requester+0x1efd/0x58c0 [rdma_rxe]\n rxe_do_task+0x130/0x230 [rdma_rxe]\n rxe_post_send+0x998/0x1860 [rdma_rxe]\n ib_uverbs_post_send+0xd5f/0x1220 [ib_uverbs]\n ib_uverbs_write+0x847/0xc80 [ib_uverbs]\n vfs_write+0x1c5/0x840\n ksys_write+0x176/0x1d0\n do_syscall_64+0x3f/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/rxe: Return CQE error if invalid lkey was supplied",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.aarch64",
"BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.ppc64le",
"BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.s390x",
"BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.src",
"BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.x86_64",
"BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.aarch64",
"BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.ppc64le",
"BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.s390x",
"BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.x86_64",
"BaseOS-9.0.0.GA:redhat-sb-certs-0:9.0-2.17.el9.noarch",
"CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.aarch64",
"CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.ppc64le",
"CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.s390x",
"CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.src",
"CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.x86_64",
"CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.aarch64",
"CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.ppc64le",
"CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.s390x",
"CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.x86_64",
"CRB-9.0.0.GA:redhat-sb-certs-0:9.0-2.17.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47076"
},
{
"category": "external",
"summary": "RHBZ#2267525",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267525"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47076"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47076",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47076"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47076-a6b6@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47076-a6b6@gregkh/T/#u"
}
],
"release_date": "2024-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-17T13:12:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.aarch64",
"BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.ppc64le",
"BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.s390x",
"BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.src",
"BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.x86_64",
"BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.aarch64",
"BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.ppc64le",
"BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.s390x",
"BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.x86_64",
"BaseOS-9.0.0.GA:redhat-sb-certs-0:9.0-2.17.el9.noarch",
"CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.aarch64",
"CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.ppc64le",
"CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.s390x",
"CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.src",
"CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.x86_64",
"CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.aarch64",
"CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.ppc64le",
"CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.s390x",
"CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.x86_64",
"CRB-9.0.0.GA:redhat-sb-certs-0:9.0-2.17.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2022:3893"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.aarch64",
"BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.ppc64le",
"BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.s390x",
"BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.src",
"BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.x86_64",
"BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.aarch64",
"BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.ppc64le",
"BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.s390x",
"BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.x86_64",
"BaseOS-9.0.0.GA:redhat-sb-certs-0:9.0-2.17.el9.noarch",
"CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.aarch64",
"CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.ppc64le",
"CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.s390x",
"CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.src",
"CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.x86_64",
"CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.aarch64",
"CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.ppc64le",
"CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.s390x",
"CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.x86_64",
"CRB-9.0.0.GA:redhat-sb-certs-0:9.0-2.17.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: RDMA/rxe: Return CQE error if invalid lkey was supplied"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.