{"id":"CVE-2021-47056","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init\n\nADF_STATUS_PF_RUNNING is (only) used and checked by adf_vf2pf_shutdown()\nbefore calling adf_iov_putmsg()-\u003emutex_lock(vf2pf_lock), however the\nvf2pf_lock is initialized in adf_dev_init(), which can fail and when it\nfail, the vf2pf_lock is either not initialized or destroyed, a subsequent\nuse of vf2pf_lock will cause issue.\nTo fix this issue, only set this flag if adf_dev_init() returns 0.\n\n[    7.178404] BUG: KASAN: user-memory-access in __mutex_lock.isra.0+0x1ac/0x7c0\n[    7.180345] Call Trace:\n[    7.182576]  mutex_lock+0xc9/0xd0\n[    7.183257]  adf_iov_putmsg+0x118/0x1a0 [intel_qat]\n[    7.183541]  adf_vf2pf_shutdown+0x4d/0x7b [intel_qat]\n[    7.183834]  adf_dev_shutdown+0x172/0x2b0 [intel_qat]\n[    7.184127]  adf_probe+0x5e9/0x600 [qat_dh895xccvf]","modified":"2026-03-15T22:42:45.943998Z","published":"2024-02-29T23:15:07.530Z","related":["SUSE-SU-2024:1454-1","SUSE-SU-2024:1465-1","SUSE-SU-2024:1489-1","SUSE-SU-2024:1643-1","SUSE-SU-2024:1646-1","SUSE-SU-2024:1870-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/20fd40fc6f2c2b41dc6f637f88d494b14e9c21f1"},{"type":"FIX","url":"https://git.kernel.org/stable/c/446045cf682af12d9294765f6c46084b374b5654"},{"type":"FIX","url":"https://git.kernel.org/stable/c/8609f5cfdc872fc3a462efa6a3eca5cb1e2f6446"},{"type":"FIX","url":"https://git.kernel.org/stable/c/f4c4e07140687f42bfa40e091bb4a55d7960ce4d"},{"type":"FIX","url":"https://git.kernel.org/stable/c/05ec8192ee4bfdf2a8894a68350dac9f1a155fa6"},{"type":"FIX","url":"https://git.kernel.org/stable/c/09d16cee6285d37cc76311c29add6d97a7e4acda"},{"type":"FIX","url":"https://git.kernel.org/stable/c/1ea500ce6f7c9106e4a561d28e69215f3d451818"},{"type":"FIX","url":"https://git.kernel.org/stable/c/1f50392650ae794a1aea41c213c6a3e1c824413c"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47056.json","unresolved_ranges":[{"events":[{"introduced":"4.7"},{"fixed":"4.9.269"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.14.233"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.191"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.119"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.37"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.11.21"}]},{"events":[{"introduced":"5.12"},{"fixed":"5.12.4"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}