{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2021-47549","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-05-24T15:02:54.831Z","datePublished":"2024-05-24T15:09:53.292Z","dateUpdated":"2025-05-04T07:13:21.648Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T07:13:21.648Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nsata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl\n\nWhen the `rmmod sata_fsl.ko` command is executed in the PPC64 GNU/Linux,\na bug is reported:\n ==================================================================\n BUG: Unable to handle kernel data access on read at 0x80000800805b502c\n Oops: Kernel access of bad area, sig: 11 [#1]\n NIP [c0000000000388a4] .ioread32+0x4/0x20\n LR [80000000000c6034] .sata_fsl_port_stop+0x44/0xe0 [sata_fsl]\n Call Trace:\n  .free_irq+0x1c/0x4e0 (unreliable)\n  .ata_host_stop+0x74/0xd0 [libata]\n  .release_nodes+0x330/0x3f0\n  .device_release_driver_internal+0x178/0x2c0\n  .driver_detach+0x64/0xd0\n  .bus_remove_driver+0x70/0xf0\n  .driver_unregister+0x38/0x80\n  .platform_driver_unregister+0x14/0x30\n  .fsl_sata_driver_exit+0x18/0xa20 [sata_fsl]\n  .__se_sys_delete_module+0x1ec/0x2d0\n  .system_call_exception+0xfc/0x1f0\n  system_call_common+0xf8/0x200\n ==================================================================\n\nThe triggering of the BUG is shown in the following stack:\n\ndriver_detach\n  device_release_driver_internal\n    __device_release_driver\n      drv->remove(dev) --> platform_drv_remove/platform_remove\n        drv->remove(dev) --> sata_fsl_remove\n          iounmap(host_priv->hcr_base);\t\t\t<---- unmap\n          kfree(host_priv);                             <---- free\n      devres_release_all\n        release_nodes\n          dr->node.release(dev, dr->data) --> ata_host_stop\n            ap->ops->port_stop(ap) --> sata_fsl_port_stop\n                ioread32(hcr_base + HCONTROL)           <---- UAF\n            host->ops->host_stop(host)\n\nThe iounmap(host_priv->hcr_base) and kfree(host_priv) functions should\nnot be executed in drv->remove. These functions should be executed in\nhost_stop after port_stop. Therefore, we move these functions to the\nnew function sata_fsl_host_stop and bind the new function to host_stop."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/ata/sata_fsl.c"],"versions":[{"version":"faf0b2e5afe7dae072d2715763c7f992b612b628","lessThan":"cdcd80292106df5cda325426e96495503e41f947","status":"affected","versionType":"git"},{"version":"faf0b2e5afe7dae072d2715763c7f992b612b628","lessThan":"91ba94d3f7afca195b224f77a72044fbde1389ce","status":"affected","versionType":"git"},{"version":"faf0b2e5afe7dae072d2715763c7f992b612b628","lessThan":"325ea49fc43cbc03a5e1e37de8f0ca6357ced4b1","status":"affected","versionType":"git"},{"version":"faf0b2e5afe7dae072d2715763c7f992b612b628","lessThan":"0769449b0a5eabc3545337217ae690e46673e73a","status":"affected","versionType":"git"},{"version":"faf0b2e5afe7dae072d2715763c7f992b612b628","lessThan":"77393806c76b6b44f1c44bd957788c8bd9152c45","status":"affected","versionType":"git"},{"version":"faf0b2e5afe7dae072d2715763c7f992b612b628","lessThan":"4a46b2f5dce02539e88a300800812bd24a45e097","status":"affected","versionType":"git"},{"version":"faf0b2e5afe7dae072d2715763c7f992b612b628","lessThan":"adf098e2a8a1e1fc075d6a5ba2edd13cf7189082","status":"affected","versionType":"git"},{"version":"faf0b2e5afe7dae072d2715763c7f992b612b628","lessThan":"6c8ad7e8cf29eb55836e7a0215f967746ab2b504","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/ata/sata_fsl.c"],"versions":[{"version":"2.6.24","status":"affected"},{"version":"0","lessThan":"2.6.24","status":"unaffected","versionType":"semver"},{"version":"4.4.294","lessThanOrEqual":"4.4.*","status":"unaffected","versionType":"semver"},{"version":"4.9.292","lessThanOrEqual":"4.9.*","status":"unaffected","versionType":"semver"},{"version":"4.14.257","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.220","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.164","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.84","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.7","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"5.16","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.24","versionEndExcluding":"4.4.294"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.24","versionEndExcluding":"4.9.292"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.24","versionEndExcluding":"4.14.257"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.24","versionEndExcluding":"4.19.220"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.24","versionEndExcluding":"5.4.164"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.24","versionEndExcluding":"5.10.84"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.24","versionEndExcluding":"5.15.7"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.24","versionEndExcluding":"5.16"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/cdcd80292106df5cda325426e96495503e41f947"},{"url":"https://git.kernel.org/stable/c/91ba94d3f7afca195b224f77a72044fbde1389ce"},{"url":"https://git.kernel.org/stable/c/325ea49fc43cbc03a5e1e37de8f0ca6357ced4b1"},{"url":"https://git.kernel.org/stable/c/0769449b0a5eabc3545337217ae690e46673e73a"},{"url":"https://git.kernel.org/stable/c/77393806c76b6b44f1c44bd957788c8bd9152c45"},{"url":"https://git.kernel.org/stable/c/4a46b2f5dce02539e88a300800812bd24a45e097"},{"url":"https://git.kernel.org/stable/c/adf098e2a8a1e1fc075d6a5ba2edd13cf7189082"},{"url":"https://git.kernel.org/stable/c/6c8ad7e8cf29eb55836e7a0215f967746ab2b504"}],"title":"sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-06-10T18:51:57.611443Z","id":"CVE-2021-47549","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-10T18:52:23.946Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T05:39:59.798Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/cdcd80292106df5cda325426e96495503e41f947","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/91ba94d3f7afca195b224f77a72044fbde1389ce","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/325ea49fc43cbc03a5e1e37de8f0ca6357ced4b1","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/0769449b0a5eabc3545337217ae690e46673e73a","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/77393806c76b6b44f1c44bd957788c8bd9152c45","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/4a46b2f5dce02539e88a300800812bd24a45e097","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/adf098e2a8a1e1fc075d6a5ba2edd13cf7189082","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/6c8ad7e8cf29eb55836e7a0215f967746ab2b504","tags":["x_transferred"]}]}]}}