In the Linux kernel, the following vulnerability has been resolved: mptcp:
fix soft lookup in subflow_error_report() Maxim reported a soft lookup in
subflow_error_report(): watchdog: BUG: soft lockup - CPU#0 stuck for 22s!
[swapper/0:0] RIP: 0010:native_queued_spin_lock_slowpath RSP:
0018:ffffa859c0003bc0 EFLAGS: 00000202 RAX: 0000000000000101 RBX:
0000000000000001 RCX: 0000000000000000 RDX: ffff9195c2772d88 RSI:
0000000000000000 RDI: ffff9195c2772d88 RBP: ffff9195c2772d00 R08:
00000000000067b0 R09: c6e31da9eb1e44f4 R10: ffff9195ef379700 R11:
ffff9195edb50710 R12: ffff9195c2772d88 R13: ffff9195f500e3d0 R14:
ffff9195ef379700 R15: ffff9195ef379700 FS: 0000000000000000(0000)
GS:ffff91961f400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000
CR0: 0000000080050033 CR2: 000000c000407000 CR3: 0000000002988000 CR4:
00000000000006f0 Call Trace: <IRQ> _raw_spin_lock_bh subflow_error_report
mptcp_subflow_data_available __mptcp_move_skbs_from_subflow
mptcp_data_ready tcp_data_queue tcp_rcv_established tcp_v4_do_rcv
tcp_v4_rcv ip_protocol_deliver_rcu ip_local_deliver_finish
__netif_receive_skb_one_core netif_receive_skb rtl8139_poll 8139too
__napi_poll net_rx_action __do_softirq __irq_exit_rcu common_interrupt
</IRQ> The calling function - mptcp_subflow_data_available() - can be
invoked from different contexts: - plain ssk socket lock - ssk socket lock
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/499ada5073361c631f2a3c4a8aed44d53b6f82ec (5.13-rc7)
git.kernel.org/stable/c/27ef25c72373222aaa5fe7b5cd890ae9cfb89a8d
git.kernel.org/stable/c/499ada5073361c631f2a3c4a8aed44d53b6f82ec
launchpad.net/bugs/cve/CVE-2021-47242
nvd.nist.gov/vuln/detail/CVE-2021-47242
security-tracker.debian.org/tracker/CVE-2021-47242
www.cve.org/CVERecord?id=CVE-2021-47242