{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2021-47376","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-05-21T14:58:30.811Z","datePublished":"2024-05-21T15:03:39.738Z","dateUpdated":"2025-05-21T08:31:44.723Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-21T08:31:44.723Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Add oversize check before call kvcalloc()\n\nCommit 7661809d493b (\"mm: don't allow oversized kvmalloc() calls\") add the\noversize check. When the allocation is larger than what kmalloc() supports,\nthe following warning triggered:\n\nWARNING: CPU: 0 PID: 8408 at mm/util.c:597 kvmalloc_node+0x108/0x110 mm/util.c:597\nModules linked in:\nCPU: 0 PID: 8408 Comm: syz-executor221 Not tainted 5.14.0-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nRIP: 0010:kvmalloc_node+0x108/0x110 mm/util.c:597\nCall Trace:\n kvmalloc include/linux/mm.h:806 [inline]\n kvmalloc_array include/linux/mm.h:824 [inline]\n kvcalloc include/linux/mm.h:829 [inline]\n check_btf_line kernel/bpf/verifier.c:9925 [inline]\n check_btf_info kernel/bpf/verifier.c:10049 [inline]\n bpf_check+0xd634/0x150d0 kernel/bpf/verifier.c:13759\n bpf_prog_load kernel/bpf/syscall.c:2301 [inline]\n __sys_bpf+0x11181/0x126e0 kernel/bpf/syscall.c:4587\n __do_sys_bpf kernel/bpf/syscall.c:4691 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:4689 [inline]\n __x64_sys_bpf+0x78/0x90 kernel/bpf/syscall.c:4689\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["kernel/bpf/verifier.c"],"versions":[{"version":"c454a46b5efd8eff8880e88ece2976e60a26bf35","lessThan":"93937596e0652d50973f9dc944fea1694ac8cdfd","status":"affected","versionType":"git"},{"version":"c454a46b5efd8eff8880e88ece2976e60a26bf35","lessThan":"6345a0bee80139ea00a341c4202ebfd1534b5eb0","status":"affected","versionType":"git"},{"version":"c454a46b5efd8eff8880e88ece2976e60a26bf35","lessThan":"b5fe7cdfee5901ce5513c30e554d51536e003bde","status":"affected","versionType":"git"},{"version":"c454a46b5efd8eff8880e88ece2976e60a26bf35","lessThan":"0e6491b559704da720f6da09dd0a52c4df44c514","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["kernel/bpf/verifier.c"],"versions":[{"version":"5.0","status":"affected"},{"version":"0","lessThan":"5.0","status":"unaffected","versionType":"semver"},{"version":"5.4.150","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.70","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.14.9","lessThanOrEqual":"5.14.*","status":"unaffected","versionType":"semver"},{"version":"5.15","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0","versionEndExcluding":"5.4.150"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0","versionEndExcluding":"5.10.70"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0","versionEndExcluding":"5.14.9"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0","versionEndExcluding":"5.15"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/93937596e0652d50973f9dc944fea1694ac8cdfd"},{"url":"https://git.kernel.org/stable/c/6345a0bee80139ea00a341c4202ebfd1534b5eb0"},{"url":"https://git.kernel.org/stable/c/b5fe7cdfee5901ce5513c30e554d51536e003bde"},{"url":"https://git.kernel.org/stable/c/0e6491b559704da720f6da09dd0a52c4df44c514"}],"title":"bpf: Add oversize check before call kvcalloc()","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-06-11T18:56:40.431373Z","id":"CVE-2021-47376","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-11T18:57:16.694Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T05:32:08.600Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/93937596e0652d50973f9dc944fea1694ac8cdfd","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/6345a0bee80139ea00a341c4202ebfd1534b5eb0","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/b5fe7cdfee5901ce5513c30e554d51536e003bde","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/0e6491b559704da720f6da09dd0a52c4df44c514","tags":["x_transferred"]}]}]}}