In the Linux kernel, the following vulnerability has been resolved: USB: usbfs: Don't WARN about excessively large memory allocations Syzbot found that the kernel generates a WARNing if the user tries to submit a bulk transfer through usbfs with a buffer that is way too large. This isn't a bug in the kernel; it's merely an invalid request from the user and the usbfs code does handle it correctly. In theory the same thing can happen with async transfers, or with the packet descriptor table for isochronous transfers. To prevent the MM subsystem from complaining about these bad allocation requests, add the __GFP_NOWARN flag to the kmalloc calls for these buffers.
History

Wed, 11 Sep 2024 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Sep 2024 13:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-03-25T09:16:22.313Z

Updated: 2024-11-04T12:00:46.330Z

Reserved: 2024-03-25T09:12:14.111Z

Link: CVE-2021-47170

cve-icon Vulnrichment

Updated: 2024-08-04T05:24:40.234Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-25T10:15:08.870

Modified: 2024-03-25T13:47:14.087

Link: CVE-2021-47170

cve-icon Redhat

Severity : Low

Publid Date: 2024-03-25T00:00:00Z

Links: CVE-2021-47170 - Bugzilla