Improper Input Validation Affecting kernel-doc package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL7-KERNELDOC-6302333
- published 28 Feb 2024
- disclosed 27 Feb 2024
Introduced: 27 Feb 2024
CVE-2021-46941 Open this link in a new tabHow to fix?
There is no fixed version for RHEL:7
kernel-doc
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-doc
package and not the kernel-doc
package as distributed by RHEL
.
See How to fix?
for RHEL:7
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
usb: dwc3: core: Do core softreset when switch mode
According to the programming guide, to switch mode for DRD controller, the driver needs to do the following.
To switch from device to host:
- Reset controller with GCTL.CoreSoftReset
- Set GCTL.PrtCapDir(host mode)
- Reset the host with USBCMD.HCRESET
- Then follow up with the initializing host registers sequence
To switch from host to device:
- Reset controller with GCTL.CoreSoftReset
- Set GCTL.PrtCapDir(device mode)
- Reset the device with DCTL.CSftRst
- Then follow up with the initializing registers sequence
Currently we're missing step 1) to do GCTL.CoreSoftReset and step 3) of switching from host to device. John Stult reported a lockup issue seen with HiKey960 platform without these steps[1]. Similar issue is observed with Ferry's testing platform[2].
So, apply the required steps along with some fixes to Yu Chen's and John Stultz's version. The main fixes to their versions are the missing wait for clocks synchronization before clearing GCTL.CoreSoftReset and only apply DCTL.CSftRst when switching from host to device.
[1] https://lore.kernel.org/linux-usb/20210108015115.27920-1-john.stultz@linaro.org/ [2] https://lore.kernel.org/linux-usb/0ba7a6ba-e6a7-9cd4-0695-64fc927e01f1@gmail.com/
References
- https://access.redhat.com/security/cve/CVE-2021-46941
- https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
- https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
- https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
- https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50