First published: Fri Mar 01 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: habanalabs/gaudi: Fix a potential use after free in gaudi_memset_device_memory Our code analyzer reported a uaf. In gaudi_memset_device_memory, cb is get via hl_cb_kernel_create() with 2 refcount. If hl_cs_allocate_job() failed, the execution runs into release_cb branch. One ref of cb is dropped by hl_cb_put(cb) and could be freed if other thread also drops one ref. Then cb is used by cb->id later, which is a potential uaf. My patch add a variable 'id' to accept the value of cb->id before the hl_cb_put(cb) is called, to avoid the potential uaf.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.12<5.12.7 | |
Linux Kernel | =5.13-rc1 | |
Linux Kernel | =5.13-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47081 has been classified as a medium severity vulnerability affecting the Linux kernel.
To fix CVE-2021-47081, you should update your Linux kernel to a version that includes the patch provided by the maintainers.
CVE-2021-47081 affects Linux kernel versions up to 5.12.7 and specific release candidates 5.13-rc1 and 5.13-rc2.
CVE-2021-47081 is identified as a use-after-free vulnerability in the Linux kernel.
CVE-2021-47081 impacts the habanalabs/gaudi area of the Linux kernel related to memory management.