CVE-2021-46950 (GCVE-0-2021-46950)
Vulnerability from cvelistv5
Published
2024-02-27 18:40
Modified
2025-05-07 20:05
Summary
In the Linux kernel, the following vulnerability has been resolved: md/raid1: properly indicate failure when ending a failed write request This patch addresses a data corruption bug in raid1 arrays using bitmaps. Without this fix, the bitmap bits for the failed I/O end up being cleared. Since we are in the failure leg of raid1_end_write_request, the request either needs to be retried (R1BIO_WriteError) or failed (R1BIO_Degraded).
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/12216d0919b64ee2ea5dc7a50e455670f44383d5 Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/2417b9869b81882ab90fd5ed1081a1cb2d4db1dd Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/538244fba59fde17186322776247cd9c05be86dd Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/59452e551784b7a57a45d971727e9db63b192515 Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/661061a45e32d8b2cc0e306da9f169ad44011382 Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/6920cef604fa57f9409e3960413e9cc11f5c5a40 Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/a6e17cab00fc5bf85472434c52ac751426257c6f Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/12216d0919b64ee2ea5dc7a50e455670f44383d5 Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/2417b9869b81882ab90fd5ed1081a1cb2d4db1dd Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/538244fba59fde17186322776247cd9c05be86dd Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/59452e551784b7a57a45d971727e9db63b192515 Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/661061a45e32d8b2cc0e306da9f169ad44011382 Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/6920cef604fa57f9409e3960413e9cc11f5c5a40 Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/a6e17cab00fc5bf85472434c52ac751426257c6f Patch
Impacted products
Vendor Product Version
Linux Linux Version: 900c531899f5ee2321bef79e20055787bc73251d
Version: 1cd972e0a10760a1fa27d9830d78446c891c23b6
Version: eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad
Version: eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad
Version: eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad
Version: eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad
Version: eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad
Version: a1f4fcb880988a96c0b2d5c3305ffc4e49eca0ed
Version: 344242d50f468a250bf4b6136934392758412ed8
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-46950",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-22T16:05:03.732905Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-07T20:05:45.419Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:17:43.080Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/12216d0919b64ee2ea5dc7a50e455670f44383d5"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/a6e17cab00fc5bf85472434c52ac751426257c6f"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/6920cef604fa57f9409e3960413e9cc11f5c5a40"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/661061a45e32d8b2cc0e306da9f169ad44011382"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/59452e551784b7a57a45d971727e9db63b192515"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/538244fba59fde17186322776247cd9c05be86dd"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/2417b9869b81882ab90fd5ed1081a1cb2d4db1dd"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/md/raid1.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "12216d0919b64ee2ea5dc7a50e455670f44383d5",
              "status": "affected",
              "version": "900c531899f5ee2321bef79e20055787bc73251d",
              "versionType": "git"
            },
            {
              "lessThan": "a6e17cab00fc5bf85472434c52ac751426257c6f",
              "status": "affected",
              "version": "1cd972e0a10760a1fa27d9830d78446c891c23b6",
              "versionType": "git"
            },
            {
              "lessThan": "6920cef604fa57f9409e3960413e9cc11f5c5a40",
              "status": "affected",
              "version": "eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad",
              "versionType": "git"
            },
            {
              "lessThan": "661061a45e32d8b2cc0e306da9f169ad44011382",
              "status": "affected",
              "version": "eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad",
              "versionType": "git"
            },
            {
              "lessThan": "59452e551784b7a57a45d971727e9db63b192515",
              "status": "affected",
              "version": "eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad",
              "versionType": "git"
            },
            {
              "lessThan": "538244fba59fde17186322776247cd9c05be86dd",
              "status": "affected",
              "version": "eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad",
              "versionType": "git"
            },
            {
              "lessThan": "2417b9869b81882ab90fd5ed1081a1cb2d4db1dd",
              "status": "affected",
              "version": "eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "a1f4fcb880988a96c0b2d5c3305ffc4e49eca0ed",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "344242d50f468a250bf4b6136934392758412ed8",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/md/raid1.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.4"
            },
            {
              "lessThan": "5.4",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.233",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.191",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.118",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.36",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.11.*",
              "status": "unaffected",
              "version": "5.11.20",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.12.*",
              "status": "unaffected",
              "version": "5.12.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.13",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.233",
                  "versionStartIncluding": "4.14.147",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.191",
                  "versionStartIncluding": "4.19.77",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.118",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.36",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.11.20",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.12.3",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.13",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.2.19",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.3.4",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid1: properly indicate failure when ending a failed write request\n\nThis patch addresses a data corruption bug in raid1 arrays using bitmaps.\nWithout this fix, the bitmap bits for the failed I/O end up being cleared.\n\nSince we are in the failure leg of raid1_end_write_request, the request\neither needs to be retried (R1BIO_WriteError) or failed (R1BIO_Degraded)."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T12:40:35.593Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/12216d0919b64ee2ea5dc7a50e455670f44383d5"
        },
        {
          "url": "https://git.kernel.org/stable/c/a6e17cab00fc5bf85472434c52ac751426257c6f"
        },
        {
          "url": "https://git.kernel.org/stable/c/6920cef604fa57f9409e3960413e9cc11f5c5a40"
        },
        {
          "url": "https://git.kernel.org/stable/c/661061a45e32d8b2cc0e306da9f169ad44011382"
        },
        {
          "url": "https://git.kernel.org/stable/c/59452e551784b7a57a45d971727e9db63b192515"
        },
        {
          "url": "https://git.kernel.org/stable/c/538244fba59fde17186322776247cd9c05be86dd"
        },
        {
          "url": "https://git.kernel.org/stable/c/2417b9869b81882ab90fd5ed1081a1cb2d4db1dd"
        }
      ],
      "title": "md/raid1: properly indicate failure when ending a failed write request",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2021-46950",
    "datePublished": "2024-02-27T18:40:34.106Z",
    "dateReserved": "2024-02-25T13:45:52.722Z",
    "dateUpdated": "2025-05-07T20:05:45.419Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-46950\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-02-27T19:04:06.420\",\"lastModified\":\"2025-04-22T16:15:20.283\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmd/raid1: properly indicate failure when ending a failed write request\\n\\nThis patch addresses a data corruption bug in raid1 arrays using bitmaps.\\nWithout this fix, the bitmap bits for the failed I/O end up being cleared.\\n\\nSince we are in the failure leg of raid1_end_write_request, the request\\neither needs to be retried (R1BIO_WriteError) or failed (R1BIO_Degraded).\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: md/raid1: indica correctamente el error al finalizar una solicitud de escritura fallida. Este parche soluciona un error de corrupci\u00f3n de datos en matrices raid1 que utilizan mapas de bits. Sin esta soluci\u00f3n, los bits del mapa de bits de la E/S fallida terminan borr\u00e1ndose. Dado que estamos en el tramo fallido de raid1_end_write_request, es necesario volver a intentar la solicitud (R1BIO_WriteError) o fallar (R1BIO_Degraded).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.14.147\",\"versionEndExcluding\":\"4.14.233\",\"matchCriteriaId\":\"06219DEF-0B7F-4D93-9878-9DC640945517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.19.77\",\"versionEndExcluding\":\"4.19.191\",\"matchCriteriaId\":\"3E80ED24-F781-449F-8035-CBA0FB5C6691\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.2.19\",\"versionEndExcluding\":\"5.3\",\"matchCriteriaId\":\"48875F15-B129-4684-8556-4EAD32A9586F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.3.4\",\"versionEndExcluding\":\"5.4.118\",\"matchCriteriaId\":\"9904B6DF-B2DB-4584-B17A-8EEC7C81258B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.36\",\"matchCriteriaId\":\"003E22D0-CA29-4338-8B35-0754C740074F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.11.20\",\"matchCriteriaId\":\"EEC03413-9760-46D4-AC1D-EB084A1D4111\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.12\",\"versionEndExcluding\":\"5.12.3\",\"matchCriteriaId\":\"F9D6B2DE-7E4A-4B3B-9AEE-3A2C5F23DA32\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/12216d0919b64ee2ea5dc7a50e455670f44383d5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/2417b9869b81882ab90fd5ed1081a1cb2d4db1dd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/538244fba59fde17186322776247cd9c05be86dd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/59452e551784b7a57a45d971727e9db63b192515\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/661061a45e32d8b2cc0e306da9f169ad44011382\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/6920cef604fa57f9409e3960413e9cc11f5c5a40\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a6e17cab00fc5bf85472434c52ac751426257c6f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/12216d0919b64ee2ea5dc7a50e455670f44383d5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/2417b9869b81882ab90fd5ed1081a1cb2d4db1dd\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/538244fba59fde17186322776247cd9c05be86dd\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/59452e551784b7a57a45d971727e9db63b192515\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/661061a45e32d8b2cc0e306da9f169ad44011382\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/6920cef604fa57f9409e3960413e9cc11f5c5a40\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a6e17cab00fc5bf85472434c52ac751426257c6f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/12216d0919b64ee2ea5dc7a50e455670f44383d5\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/a6e17cab00fc5bf85472434c52ac751426257c6f\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/6920cef604fa57f9409e3960413e9cc11f5c5a40\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/661061a45e32d8b2cc0e306da9f169ad44011382\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/59452e551784b7a57a45d971727e9db63b192515\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/538244fba59fde17186322776247cd9c05be86dd\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/2417b9869b81882ab90fd5ed1081a1cb2d4db1dd\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T05:17:43.080Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-46950\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-22T16:05:03.732905Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"description\": \"CWE-noinfo Not enough information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-05T15:20:41.094Z\"}}], \"cna\": {\"title\": \"md/raid1: properly indicate failure when ending a failed write request\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"900c531899f5ee2321bef79e20055787bc73251d\", \"lessThan\": \"12216d0919b64ee2ea5dc7a50e455670f44383d5\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1cd972e0a10760a1fa27d9830d78446c891c23b6\", \"lessThan\": \"a6e17cab00fc5bf85472434c52ac751426257c6f\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad\", \"lessThan\": \"6920cef604fa57f9409e3960413e9cc11f5c5a40\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad\", \"lessThan\": \"661061a45e32d8b2cc0e306da9f169ad44011382\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad\", \"lessThan\": \"59452e551784b7a57a45d971727e9db63b192515\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad\", \"lessThan\": \"538244fba59fde17186322776247cd9c05be86dd\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad\", \"lessThan\": \"2417b9869b81882ab90fd5ed1081a1cb2d4db1dd\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a1f4fcb880988a96c0b2d5c3305ffc4e49eca0ed\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"344242d50f468a250bf4b6136934392758412ed8\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/md/raid1.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.4\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.4\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.14.233\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.14.*\"}, {\"status\": \"unaffected\", \"version\": \"4.19.191\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.118\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.36\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.11.20\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.11.*\"}, {\"status\": \"unaffected\", \"version\": \"5.12.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.12.*\"}, {\"status\": \"unaffected\", \"version\": \"5.13\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/md/raid1.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/12216d0919b64ee2ea5dc7a50e455670f44383d5\"}, {\"url\": \"https://git.kernel.org/stable/c/a6e17cab00fc5bf85472434c52ac751426257c6f\"}, {\"url\": \"https://git.kernel.org/stable/c/6920cef604fa57f9409e3960413e9cc11f5c5a40\"}, {\"url\": \"https://git.kernel.org/stable/c/661061a45e32d8b2cc0e306da9f169ad44011382\"}, {\"url\": \"https://git.kernel.org/stable/c/59452e551784b7a57a45d971727e9db63b192515\"}, {\"url\": \"https://git.kernel.org/stable/c/538244fba59fde17186322776247cd9c05be86dd\"}, {\"url\": \"https://git.kernel.org/stable/c/2417b9869b81882ab90fd5ed1081a1cb2d4db1dd\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmd/raid1: properly indicate failure when ending a failed write request\\n\\nThis patch addresses a data corruption bug in raid1 arrays using bitmaps.\\nWithout this fix, the bitmap bits for the failed I/O end up being cleared.\\n\\nSince we are in the failure leg of raid1_end_write_request, the request\\neither needs to be retried (R1BIO_WriteError) or failed (R1BIO_Degraded).\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.14.233\", \"versionStartIncluding\": \"4.14.147\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.191\", \"versionStartIncluding\": \"4.19.77\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.118\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.36\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.11.20\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.12.3\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.13\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"5.2.19\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"5.3.4\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T12:40:35.593Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2021-46950\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-07T20:05:45.419Z\", \"dateReserved\": \"2024-02-25T13:45:52.722Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-02-27T18:40:34.106Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…