Bugzilla – Bug 1220577
VUL-0: CVE-2021-47048: kernel: spi: spi-zynqmp-gqspi: use-after-free in zynqmp_qspi_exec_op
Last modified: 2024-05-29 12:00:52 UTC
In the Linux kernel, the following vulnerability has been resolved: spi: spi-zynqmp-gqspi: fix use-after-free in zynqmp_qspi_exec_op When handling op->addr, it is using the buffer "tmpbuf" which has been freed. This will trigger a use-after-free KASAN warning. Let's use temporary variables to store op->addr.val and op->cmd.opcode to fix this issue. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-47048 https://git.kernel.org/stable/c/a2c5bedb2d55dd27c642c7b9fb6886d7ad7bdb58 https://git.kernel.org/stable/c/d67e0d6bd92ebbb0294e7062bbf5cdc773764e62 https://www.cve.org/CVERecord?id=CVE-2021-47048 https://git.kernel.org/stable/c/1231279389b5e638bc3b66b9741c94077aed4b5a https://git.kernel.org/stable/c/23269ac9f123eca3aea7682d3345c02e71ed696c
Introduced in 5.10 and fix present on: - SLE15-SP6 - cve/linux-5.14 - stable Only changelog update needed
How I could add tag to something with is part of the 'baseline'? There is no patch to which I could add reference. $ git describe a2c5bedb2d55dd27c642c7b9fb6886d7ad7bdb58 v5.12-rc2-105-ga2c5bedb2d55
One way is to add an empty commit with just the reference. It will propagate to the changelog. Adding Takashi in case there is a different preferred way.
As the base kernel already contains the fix, we are unaffected. Just reassign back to security team.
All done, closing.