CVE-2021-47220 
                        Detail
                     
                    
                    
                        
                            
                                
                                    Rejected  
                                     
                                    This CVE has been marked Rejected in the CVE List. These CVEs are stored in the NVD, but do not show up in search results by default.
                                 
                             
                            Description  
                            
                            Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
                            
                            
                            
                            
                                Metrics 
                                 
                                
                                    CVSS Version 4.0
                                     
                                    CVSS Version 3.x
                                     
                                    CVSS Version 2.0
                                     
                                
                                
                                    
                                        
                                            NVD enrichment efforts reference publicly available information to associate
                                            vector strings. CVSS information contributed by other sources is also
                                            displayed.
                                         
                                     
                                
                                
                                
                                    CVSS 4.0 Severity and Vector Strings: 
                                    
                                    
                                        
                                        
                                        
                                        
                                       
                                             NVD assessment
                                       not yet provided.    
                                        
                                     
                                    
                                    
                                    
                                    
                                 
                                
                                
                                    CVSS 3.x Severity and Vector Strings: 
                                    
                                    
                                        
                                        
                                        
                                        
												
                                             NVD assessment
														not yet provided.    
                                        
                                     
                                    
                                    
                                    
                                    
                                    
                                    
                                    
                                    
                                 
                                
                                
                                    CVSS 2.0 Severity and Vector Strings:   
                                    
                                    
                                        
                                        
                                        
												 NVD assessment
														not yet provided.    
                                        
                                     
                                    
                                    
                                    
                                    
                                    
                                    
                                    
                                    
                                 
                             
                            
                                
                                
                                
                                
                                    References to Advisories, Solutions, and Tools 
                                    
                                        By selecting these links, you will be leaving NIST webspace.
                                        We have provided these links to other web sites because they
                                        may have information that would be of interest to you. No
                                        inferences should be drawn on account of other sites being
                                        referenced, or not, from this page. There may be other web
                                        sites that are more appropriate for your purpose. NIST does
                                        not necessarily endorse the views expressed, or concur with
                                        the facts presented on these sites. Further, NIST does not
                                        endorse any commercial products that may be mentioned on
                                        these sites. Please address comments about this page to [email protected]  .
                                    
                                    
                                 
                                
                                
                                
                                
                                    Change History 
                                     6 change records found show changes 
                                     
                                    
	
		
			 
			
				CVE Translated by kernel.org  10/03/2024 11:15:13 AM  
			 
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Removed 
						Translation 
						
							
							
							
								
								Record truncated, showing 2048 of 3168 characters.   
								
                             View Entire Change Record  
								Title: kernel de Linux
Description: En el kernel de Linux, se resolvió la siguiente vulnerabilidad: usb: dwc3: core: soluciona el pánico del kernel cuando se reinicia. Cuando se reinicia el sistema, llama a dwc3_shutdown y todos los debugfs para dwc3 se eliminan primero, cuando el dispositivo intenta realizar deinit. y elimina debugfs para sus endpoints, se encuentra con el problema de desreferencia del puntero NULL cuando se llama a debugfs_lookup. Solucionelo eliminando todos los debugfs de dwc3 posteriores a dwc3_drd_exit. [2924.958838] No se puede manejar la desreferencia del puntero NULL del kernel en la dirección virtual 0000000000000002 .... [2925.030994] pstate: 60000005 (nZCv daif -PAN -UAO -TCO BTYPE=--) [2925.037005] pc: inode_permission+0x2c /0x198 [ 2925.041281 ] lr: lookup_one_len_common+0xb0/0xf8 [2925.045903] sp: ffff80001276ba70 [2925.049218] x29: ffff80001276ba70 x28: ffff0000c01f0000 x27: 0000000000000 000 [2925.056364] x26: ffff800011791e70 x25: 0000000000000008 x24: muerto000000000100 [2925.063510] x23: muerto000000000122 x22: 00000000000000 00x21: 0000000000000001 [ 2925.070652] x20: ffff8000122c6188 x19: 0000000000000000 x18: 0000000000000000 [ 2925.077797] x17: 0000000000000000 x16: 00000000 x15: 0000000000000004 [ 2925.084943] x14: ffffffffffffffff x13: 0000000000000000 x12: 0000000000000030 [ 2925.092087] x11: 101010101 x10: 7f7f7f7f7f7f7f7f x9: ffff8000102b2420 [2925.099232 ] x8: 7f7f7f7f7f7f7f7f x7: feff73746e2f6f64 x6: 0000000000008080 [2925.106378] x5: 61c8864680b583eb x4: 209e6ec2d263dbb7 x3: 000074756 f307065 [2925.113523] x2: 0000000000000001 x1: 0000000000000000 x0: ffff8000122c6188 [2925.120671] Seguimiento de llamada: [2925.123119] inode_permission+0x2c/0x 198 [ 2925.127042 ] lookup_one_len_common+0xb0/0xf8 [ 2925.131315] lookup_one_len_unlocked+0x34/0xb0 [ 2925.135764] lookup_positive_unlocked+0x14/0x50 [ 2925.140296] debugfs_lookup+0x68/0xa0 [ 292 5.143964] dwc3_gadget_free_endpoints+0x84/0xb0 [ 2925.148675] dwc3_gadget_exit+0x28/0x78 [ 2925.152518] dwc3_drd_exit +0x100/0x1f8 
								
								
							
							
						 
							
						
								
								
						 
					 
				 
			
		 
	
		
			 
			
				CVE Modified by kernel.org  10/03/2024 11:15:13 AM  
			 
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Changed 
						Description 
						
							
							
							
								
								Record truncated, showing 2048 of 2965 characters.   
								
                             View Entire Change Record  
								In the Linux kernel, the following vulnerability has been resolved:
usb: dwc3: core: fix kernel panic when do reboot
When do system reboot, it calls dwc3_shutdown and the whole debugfs
for dwc3 has removed first, when the gadget tries to do deinit, and
remove debugfs for its endpoints, it meets NULL pointer dereference
issue when call debugfs_lookup. Fix it by removing the whole dwc3
debugfs later than dwc3_drd_exit.
[ 2924.958838] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000002
....
[ 2925.030994] pstate: 60000005 (nZCv daif -PAN -UAO -TCO BTYPE=--)
[ 2925.037005] pc : inode_permission+0x2c/0x198
[ 2925.041281] lr : lookup_one_len_common+0xb0/0xf8
[ 2925.045903] sp : ffff80001276ba70
[ 2925.049218] x29: ffff80001276ba70 x28: ffff0000c01f0000 x27: 0000000000000000
[ 2925.056364] x26: ffff800011791e70 x25: 0000000000000008 x24: dead000000000100
[ 2925.063510] x23: dead000000000122 x22: 0000000000000000 x21: 0000000000000001
[ 2925.070652] x20: ffff8000122c6188 x19: 0000000000000000 x18: 0000000000000000
[ 2925.077797] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000004
[ 2925.084943] x14: ffffffffffffffff x13: 0000000000000000 x12: 0000000000000030
[ 2925.092087] x11: 0101010101010101 x10: 7f7f7f7f7f7f7f7f x9 : ffff8000102b2420
[ 2925.099232] x8 : 7f7f7f7f7f7f7f7f x7 : feff73746e2f6f64 x6 : 0000000000008080
[ 2925.106378] x5 : 61c8864680b583eb x4 : 209e6ec2d263dbb7 x3 : 000074756f307065
[ 2925.113523] x2 : 0000000000000001 x1 : 0000000000000000 x0 : ffff8000122c6188
[ 2925.120671] Call trace:
[ 2925.123119]  inode_permission+0x2c/0x198
[ 2925.127042]  lookup_one_len_common+0xb0/0xf8
[ 2925.131315]  lookup_one_len_unlocked+0x34/0xb0
[ 2925.135764]  lookup_positive_unlocked+0x14/0x50
[ 2925.140296]  debugfs_lookup+0x68/0xa0
[ 2925.143964]  dwc3_gadget_free_endpoints+0x84/0xb0
[ 2925.148675]  dwc3_gadget_exit+0x28/0x78
[ 2925.152518]  dwc3_drd_exit+0x100/0x1f8
[ 2925.156267]  dwc3_remove+0x11c/0x120
[ 2925.159851]  dwc3_shutdown+0x14/0x20
[ 2925.163432]  platform_ 
								
								
							
							
						 
							
						
							
								Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. 
								  
								
                              
								
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								kernel.org https://git.kernel.org/stable/c/174c27583b3807ac96228c442735b02622d8d1c3 
								  
								
                              
								
								
								
							
							
						 
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								kernel.org https://git.kernel.org/stable/c/2a042767814bd0edf2619f06fecd374e266ea068 
								  
								
                              
								
								
								
							
							
						 
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								kernel.org https://git.kernel.org/stable/c/58b5e02c6ca0e2b7c87cd8023ff786ef3c0eef74 
								  
								
                              
								
								
								
							
							
						 
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								kernel.org https://git.kernel.org/stable/c/7f9745ab342bcce5efd5d4d2297d0a3dd9db0eac 
								  
								
                              
								
								
								
							
							
						 
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								kernel.org https://git.kernel.org/stable/c/fa8c413e6b74ae5d12daf911c73238c5bdacd8e6 
								  
								
                              
								
								
								
							
							
						 
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								kernel.org https://git.kernel.org/stable/c/fd7c4bd582494934be15d41aebe0dbe23790605f 
								  
								
                              
								
								
								
							
							
						 
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								kernel.org https://git.kernel.org/stable/c/ff4c63f3e8cb7af2ce51cc56b031e08fd23c758b 
								  
								
                              
								
								
								
							
							
						 
							
						
								
								
						 
					 
				 
			
		 
	
		
			 
			
				CVE Rejected by kernel.org  10/03/2024 11:15:13 AM  
			 
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
				 
			
		 
	
		
			 
			
				CVE Modified by kernel.org  10/03/2024 9:15:13 AM  
			 
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Changed 
						Description 
						
							
							
							
								
								Record truncated, showing 2048 of 3035 characters.   
								
                             View Entire Change Record  
								In the Linux kernel, the following vulnerability has been resolved:
usb: dwc3: core: fix kernel panic when do reboot
When do system reboot, it calls dwc3_shutdown and the whole debugfs
for dwc3 has removed first, when the gadget tries to do deinit, and
remove debugfs for its endpoints, it meets NULL pointer dereference
issue when call debugfs_lookup. Fix it by removing the whole dwc3
debugfs later than dwc3_drd_exit.
[ 2924.958838] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000002
....
[ 2925.030994] pstate: 60000005 (nZCv daif -PAN -UAO -TCO BTYPE=--)
[ 2925.037005] pc : inode_permission+0x2c/0x198
[ 2925.041281] lr : lookup_one_len_common+0xb0/0xf8
[ 2925.045903] sp : ffff80001276ba70
[ 2925.049218] x29: ffff80001276ba70 x28: ffff0000c01f0000 x27: 0000000000000000
[ 2925.056364] x26: ffff800011791e70 x25: 0000000000000008 x24: dead000000000100
[ 2925.063510] x23: dead000000000122 x22: 0000000000000000 x21: 0000000000000001
[ 2925.070652] x20: ffff8000122c6188 x19: 0000000000000000 x18: 0000000000000000
[ 2925.077797] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000004
[ 2925.084943] x14: ffffffffffffffff x13: 0000000000000000 x12: 0000000000000030
[ 2925.092087] x11: 0101010101010101 x10: 7f7f7f7f7f7f7f7f x9 : ffff8000102b2420
[ 2925.099232] x8 : 7f7f7f7f7f7f7f7f x7 : feff73746e2f6f64 x6 : 0000000000008080
[ 2925.106378] x5 : 61c8864680b583eb x4 : 209e6ec2d263dbb7 x3 : 000074756f307065
[ 2925.113523] x2 : 0000000000000001 x1 : 0000000000000000 x0 : ffff8000122c6188
[ 2925.120671] Call trace:
[ 2925.123119]  inode_permission+0x2c/0x198
[ 2925.127042]  lookup_one_len_common+0xb0/0xf8
[ 2925.131315]  lookup_one_len_unlocked+0x34/0xb0
[ 2925.135764]  lookup_positive_unlocked+0x14/0x50
[ 2925.140296]  debugfs_lookup+0x68/0xa0
[ 2925.143964]  dwc3_gadget_free_endpoints+0x84/0xb0
[ 2925.148675]  dwc3_gadget_exit+0x28/0x78
[ 2925.152518]  dwc3_drd_exit+0x100/0x1f8
[ 2925.156267]  dwc3_remove+0x11c/0x120
[ 2925.159851]  dwc3_shutdown+0x14/0x20
[ 2925.163432]  platform_ 
								
								
							
							
						 
							
						
							
								
								Record truncated, showing 2048 of 2965 characters.   
								
                             View Entire Change Record  
								In the Linux kernel, the following vulnerability has been resolved:
usb: dwc3: core: fix kernel panic when do reboot
When do system reboot, it calls dwc3_shutdown and the whole debugfs
for dwc3 has removed first, when the gadget tries to do deinit, and
remove debugfs for its endpoints, it meets NULL pointer dereference
issue when call debugfs_lookup. Fix it by removing the whole dwc3
debugfs later than dwc3_drd_exit.
[ 2924.958838] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000002
....
[ 2925.030994] pstate: 60000005 (nZCv daif -PAN -UAO -TCO BTYPE=--)
[ 2925.037005] pc : inode_permission+0x2c/0x198
[ 2925.041281] lr : lookup_one_len_common+0xb0/0xf8
[ 2925.045903] sp : ffff80001276ba70
[ 2925.049218] x29: ffff80001276ba70 x28: ffff0000c01f0000 x27: 0000000000000000
[ 2925.056364] x26: ffff800011791e70 x25: 0000000000000008 x24: dead000000000100
[ 2925.063510] x23: dead000000000122 x22: 0000000000000000 x21: 0000000000000001
[ 2925.070652] x20: ffff8000122c6188 x19: 0000000000000000 x18: 0000000000000000
[ 2925.077797] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000004
[ 2925.084943] x14: ffffffffffffffff x13: 0000000000000000 x12: 0000000000000030
[ 2925.092087] x11: 0101010101010101 x10: 7f7f7f7f7f7f7f7f x9 : ffff8000102b2420
[ 2925.099232] x8 : 7f7f7f7f7f7f7f7f x7 : feff73746e2f6f64 x6 : 0000000000008080
[ 2925.106378] x5 : 61c8864680b583eb x4 : 209e6ec2d263dbb7 x3 : 000074756f307065
[ 2925.113523] x2 : 0000000000000001 x1 : 0000000000000000 x0 : ffff8000122c6188
[ 2925.120671] Call trace:
[ 2925.123119]  inode_permission+0x2c/0x198
[ 2925.127042]  lookup_one_len_common+0xb0/0xf8
[ 2925.131315]  lookup_one_len_unlocked+0x34/0xb0
[ 2925.135764]  lookup_positive_unlocked+0x14/0x50
[ 2925.140296]  debugfs_lookup+0x68/0xa0
[ 2925.143964]  dwc3_gadget_free_endpoints+0x84/0xb0
[ 2925.148675]  dwc3_gadget_exit+0x28/0x78
[ 2925.152518]  dwc3_drd_exit+0x100/0x1f8
[ 2925.156267]  dwc3_remove+0x11c/0x120
[ 2925.159851]  dwc3_shutdown+0x14/0x20
[ 2925.163432]  platform_ 
								
								
						 
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								kernel.org https://git.kernel.org/stable/c/2a042767814bd0edf2619f06fecd374e266ea068 [No types assigned] 
								  
								
                              
								
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								kernel.org https://git.kernel.org/stable/c/4bf584a03eec674975ee9fe36c8583d9d470dab1 
								  
								
                              
								
								
								
							
							
						 
							
						
								
								
						 
					 
				 
			
		 
	
		
			 
			
				CVE Modified by kernel.org  5/28/2024 4:15:48 PM  
			 
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
				 
			
		 
	
		
			 
			
				New CVE Received from kernel.org  5/21/2024 11:15:11 AM  
			 
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Description 
						
							
							
								
								
							
							
						 
							
						
							
								
								Record truncated, showing 2048 of 3035 characters.   
								
                             View Entire Change Record  
								In the Linux kernel, the following vulnerability has been resolved:
usb: dwc3: core: fix kernel panic when do reboot
When do system reboot, it calls dwc3_shutdown and the whole debugfs
for dwc3 has removed first, when the gadget tries to do deinit, and
remove debugfs for its endpoints, it meets NULL pointer dereference
issue when call debugfs_lookup. Fix it by removing the whole dwc3
debugfs later than dwc3_drd_exit.
[ 2924.958838] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000002
....
[ 2925.030994] pstate: 60000005 (nZCv daif -PAN -UAO -TCO BTYPE=--)
[ 2925.037005] pc : inode_permission+0x2c/0x198
[ 2925.041281] lr : lookup_one_len_common+0xb0/0xf8
[ 2925.045903] sp : ffff80001276ba70
[ 2925.049218] x29: ffff80001276ba70 x28: ffff0000c01f0000 x27: 0000000000000000
[ 2925.056364] x26: ffff800011791e70 x25: 0000000000000008 x24: dead000000000100
[ 2925.063510] x23: dead000000000122 x22: 0000000000000000 x21: 0000000000000001
[ 2925.070652] x20: ffff8000122c6188 x19: 0000000000000000 x18: 0000000000000000
[ 2925.077797] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000004
[ 2925.084943] x14: ffffffffffffffff x13: 0000000000000000 x12: 0000000000000030
[ 2925.092087] x11: 0101010101010101 x10: 7f7f7f7f7f7f7f7f x9 : ffff8000102b2420
[ 2925.099232] x8 : 7f7f7f7f7f7f7f7f x7 : feff73746e2f6f64 x6 : 0000000000008080
[ 2925.106378] x5 : 61c8864680b583eb x4 : 209e6ec2d263dbb7 x3 : 000074756f307065
[ 2925.113523] x2 : 0000000000000001 x1 : 0000000000000000 x0 : ffff8000122c6188
[ 2925.120671] Call trace:
[ 2925.123119]  inode_permission+0x2c/0x198
[ 2925.127042]  lookup_one_len_common+0xb0/0xf8
[ 2925.131315]  lookup_one_len_unlocked+0x34/0xb0
[ 2925.135764]  lookup_positive_unlocked+0x14/0x50
[ 2925.140296]  debugfs_lookup+0x68/0xa0
[ 2925.143964]  dwc3_gadget_free_endpoints+0x84/0xb0
[ 2925.148675]  dwc3_gadget_exit+0x28/0x78
[ 2925.152518]  dwc3_drd_exit+0x100/0x1f8
[ 2925.156267]  dwc3_remove+0x11c/0x120
[ 2925.159851]  dwc3_shutdown+0x14/0x20
[ 2925.163432]  platform_ 
								
								
						 
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								kernel.org https://git.kernel.org/stable/c/174c27583b3807ac96228c442735b02622d8d1c3 [No types assigned] 
								  
								
                              
								
								
								
						 
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								kernel.org https://git.kernel.org/stable/c/4bf584a03eec674975ee9fe36c8583d9d470dab1 [No types assigned] 
								  
								
                              
								
								
								
						 
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								kernel.org https://git.kernel.org/stable/c/58b5e02c6ca0e2b7c87cd8023ff786ef3c0eef74 [No types assigned] 
								  
								
                              
								
								
								
						 
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								kernel.org https://git.kernel.org/stable/c/7f9745ab342bcce5efd5d4d2297d0a3dd9db0eac [No types assigned] 
								  
								
                              
								
								
								
						 
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								kernel.org https://git.kernel.org/stable/c/fa8c413e6b74ae5d12daf911c73238c5bdacd8e6 [No types assigned] 
								  
								
                              
								
								
								
						 
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								kernel.org https://git.kernel.org/stable/c/fd7c4bd582494934be15d41aebe0dbe23790605f [No types assigned] 
								  
								
                              
								
								
								
						 
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								kernel.org https://git.kernel.org/stable/c/ff4c63f3e8cb7af2ce51cc56b031e08fd23c758b [No types assigned] 
								  
								
                              
								
								
								
						 
					 
				 
			
		  
	 
                                 
                             
                         
                        
                            
                                Quick Info 
                                CVE Dictionary Entry:  CVE-2021-47220  NVD
                                Published Date:  05/21/2024  NVD
                                Last Modified:  10/03/2024  
                                Source:  kernel.org