{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2021-47297","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-05-21T13:27:52.132Z","datePublished":"2024-05-21T14:35:19.982Z","dateUpdated":"2025-05-04T07:08:12.115Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T07:08:12.115Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix uninit-value in caif_seqpkt_sendmsg\n\nWhen nr_segs equal to zero in iovec_from_user, the object\nmsg->msg_iter.iov is uninit stack memory in caif_seqpkt_sendmsg\nwhich is defined in ___sys_sendmsg. So we cann't just judge\nmsg->msg_iter.iov->base directlly. We can use nr_segs to judge\nmsg in caif_seqpkt_sendmsg whether has data buffers.\n\n=====================================================\nBUG: KMSAN: uninit-value in caif_seqpkt_sendmsg+0x693/0xf60 net/caif/caif_socket.c:542\nCall Trace:\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0x1c9/0x220 lib/dump_stack.c:118\n kmsan_report+0xf7/0x1e0 mm/kmsan/kmsan_report.c:118\n __msan_warning+0x58/0xa0 mm/kmsan/kmsan_instr.c:215\n caif_seqpkt_sendmsg+0x693/0xf60 net/caif/caif_socket.c:542\n sock_sendmsg_nosec net/socket.c:652 [inline]\n sock_sendmsg net/socket.c:672 [inline]\n ____sys_sendmsg+0x12b6/0x1350 net/socket.c:2343\n ___sys_sendmsg net/socket.c:2397 [inline]\n __sys_sendmmsg+0x808/0xc90 net/socket.c:2480\n __compat_sys_sendmmsg net/compat.c:656 [inline]"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/caif/caif_socket.c"],"versions":[{"version":"bece7b2398d073d11b2e352405a3ecd3a1e39c60","lessThan":"d9d646acad2c3590e189bb5d5c86ab8bd8a2dfc3","status":"affected","versionType":"git"},{"version":"bece7b2398d073d11b2e352405a3ecd3a1e39c60","lessThan":"5c6d8e2f7187b8e45a18c27acb7a3885f03ee3db","status":"affected","versionType":"git"},{"version":"bece7b2398d073d11b2e352405a3ecd3a1e39c60","lessThan":"ffe31dd70b70a40cd6b21b78c1713a23e021843a","status":"affected","versionType":"git"},{"version":"bece7b2398d073d11b2e352405a3ecd3a1e39c60","lessThan":"452c3ed7bf63721b07bc2238ed1261bb26027e85","status":"affected","versionType":"git"},{"version":"bece7b2398d073d11b2e352405a3ecd3a1e39c60","lessThan":"9413c0abb57f70a953b1116318d6aa478013c35d","status":"affected","versionType":"git"},{"version":"bece7b2398d073d11b2e352405a3ecd3a1e39c60","lessThan":"1582a02fecffcee306663035a295e28e1c4aaaff","status":"affected","versionType":"git"},{"version":"bece7b2398d073d11b2e352405a3ecd3a1e39c60","lessThan":"d4c7797ab1517515f0d08b3bc1c6b48883889c54","status":"affected","versionType":"git"},{"version":"bece7b2398d073d11b2e352405a3ecd3a1e39c60","lessThan":"991e634360f2622a683b48dfe44fe6d9cb765a09","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/caif/caif_socket.c"],"versions":[{"version":"2.6.35","status":"affected"},{"version":"0","lessThan":"2.6.35","status":"unaffected","versionType":"semver"},{"version":"4.4.277","lessThanOrEqual":"4.4.*","status":"unaffected","versionType":"semver"},{"version":"4.9.277","lessThanOrEqual":"4.9.*","status":"unaffected","versionType":"semver"},{"version":"4.14.241","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.199","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.136","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.54","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.13.6","lessThanOrEqual":"5.13.*","status":"unaffected","versionType":"semver"},{"version":"5.14","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.35","versionEndExcluding":"4.4.277"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.35","versionEndExcluding":"4.9.277"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.35","versionEndExcluding":"4.14.241"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.35","versionEndExcluding":"4.19.199"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.35","versionEndExcluding":"5.4.136"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.35","versionEndExcluding":"5.10.54"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.35","versionEndExcluding":"5.13.6"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.35","versionEndExcluding":"5.14"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/d9d646acad2c3590e189bb5d5c86ab8bd8a2dfc3"},{"url":"https://git.kernel.org/stable/c/5c6d8e2f7187b8e45a18c27acb7a3885f03ee3db"},{"url":"https://git.kernel.org/stable/c/ffe31dd70b70a40cd6b21b78c1713a23e021843a"},{"url":"https://git.kernel.org/stable/c/452c3ed7bf63721b07bc2238ed1261bb26027e85"},{"url":"https://git.kernel.org/stable/c/9413c0abb57f70a953b1116318d6aa478013c35d"},{"url":"https://git.kernel.org/stable/c/1582a02fecffcee306663035a295e28e1c4aaaff"},{"url":"https://git.kernel.org/stable/c/d4c7797ab1517515f0d08b3bc1c6b48883889c54"},{"url":"https://git.kernel.org/stable/c/991e634360f2622a683b48dfe44fe6d9cb765a09"}],"title":"net: fix uninit-value in caif_seqpkt_sendmsg","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-noinfo Not enough information"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.5,"attackVector":"LOCAL","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-05-29T18:54:57.355756Z","id":"CVE-2021-47297","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-06T19:35:49.436Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T05:32:08.483Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/d9d646acad2c3590e189bb5d5c86ab8bd8a2dfc3","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/5c6d8e2f7187b8e45a18c27acb7a3885f03ee3db","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/ffe31dd70b70a40cd6b21b78c1713a23e021843a","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/452c3ed7bf63721b07bc2238ed1261bb26027e85","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/9413c0abb57f70a953b1116318d6aa478013c35d","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/1582a02fecffcee306663035a295e28e1c4aaaff","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/d4c7797ab1517515f0d08b3bc1c6b48883889c54","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/991e634360f2622a683b48dfe44fe6d9cb765a09","tags":["x_transferred"]}]}]}}