CVE-2021-46941 (GCVE-0-2021-46941)
Vulnerability from cvelistv5
Published
2024-02-27 18:40
Modified
2024-12-19 07:32
Severity ?
EPSS score ?
0.01% (0.0083)
Summary
In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: core: Do core softreset when switch mode According to the programming guide, to switch mode for DRD controller, the driver needs to do the following. To switch from device to host: 1. Reset controller with GCTL.CoreSoftReset 2. Set GCTL.PrtCapDir(host mode) 3. Reset the host with USBCMD.HCRESET 4. Then follow up with the initializing host registers sequence To switch from host to device: 1. Reset controller with GCTL.CoreSoftReset 2. Set GCTL.PrtCapDir(device mode) 3. Reset the device with DCTL.CSftRst 4. Then follow up with the initializing registers sequence Currently we're missing step 1) to do GCTL.CoreSoftReset and step 3) of switching from host to device. John Stult reported a lockup issue seen with HiKey960 platform without these steps[1]. Similar issue is observed with Ferry's testing platform[2]. So, apply the required steps along with some fixes to Yu Chen's and John Stultz's version. The main fixes to their versions are the missing wait for clocks synchronization before clearing GCTL.CoreSoftReset and only apply DCTL.CSftRst when switching from host to device. [1] https://lore.kernel.org/linux-usb/20210108015115.27920-1-john.stultz@linaro.org/ [2] https://lore.kernel.org/linux-usb/0ba7a6ba-e6a7-9cd4-0695-64fc927e01f1@gmail.com/
Impacted products
Vendor Product Version
Linux Linux Version: 41ce1456e1dbbc7355d0fcc10cf7c337c13def24
Version: 41ce1456e1dbbc7355d0fcc10cf7c337c13def24
Version: 41ce1456e1dbbc7355d0fcc10cf7c337c13def24
Version: 41ce1456e1dbbc7355d0fcc10cf7c337c13def24
Create a notification for this product.
   Linux Linux Version: 4.12
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2021-46941",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-02-27T20:12:24.351599Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-05T17:22:02.831Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T05:17:43.030Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Linux",
               programFiles: [
                  "drivers/usb/dwc3/core.c",
                  "drivers/usb/dwc3/core.h",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     lessThan: "fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50",
                     status: "affected",
                     version: "41ce1456e1dbbc7355d0fcc10cf7c337c13def24",
                     versionType: "git",
                  },
                  {
                     lessThan: "800f58217626c8b147aa40660e572ed8a0d56e3b",
                     status: "affected",
                     version: "41ce1456e1dbbc7355d0fcc10cf7c337c13def24",
                     versionType: "git",
                  },
                  {
                     lessThan: "1c10fd60c8595ea7ff7e29d3cf1fa88069941da3",
                     status: "affected",
                     version: "41ce1456e1dbbc7355d0fcc10cf7c337c13def24",
                     versionType: "git",
                  },
                  {
                     lessThan: "f88359e1588b85cf0e8209ab7d6620085f3441d9",
                     status: "affected",
                     version: "41ce1456e1dbbc7355d0fcc10cf7c337c13def24",
                     versionType: "git",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "Linux",
               programFiles: [
                  "drivers/usb/dwc3/core.c",
                  "drivers/usb/dwc3/core.h",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     status: "affected",
                     version: "4.12",
                  },
                  {
                     lessThan: "4.12",
                     status: "unaffected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.10.*",
                     status: "unaffected",
                     version: "5.10.36",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.11.*",
                     status: "unaffected",
                     version: "5.11.20",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.12.*",
                     status: "unaffected",
                     version: "5.12.3",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "*",
                     status: "unaffected",
                     version: "5.13",
                     versionType: "original_commit_for_fix",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: core: Do core softreset when switch mode\n\n\nAccording to the programming guide, to switch mode for DRD controller,\nthe driver needs to do the following.\n\nTo switch from device to host:\n1. Reset controller with GCTL.CoreSoftReset\n2. Set GCTL.PrtCapDir(host mode)\n3. Reset the host with USBCMD.HCRESET\n4. Then follow up with the initializing host registers sequence\n\nTo switch from host to device:\n1. Reset controller with GCTL.CoreSoftReset\n2. Set GCTL.PrtCapDir(device mode)\n3. Reset the device with DCTL.CSftRst\n4. Then follow up with the initializing registers sequence\n\nCurrently we're missing step 1) to do GCTL.CoreSoftReset and step 3) of\nswitching from host to device. John Stult reported a lockup issue seen\nwith HiKey960 platform without these steps[1]. Similar issue is observed\nwith Ferry's testing platform[2].\n\nSo, apply the required steps along with some fixes to Yu Chen's and John\nStultz's version. The main fixes to their versions are the missing wait\nfor clocks synchronization before clearing GCTL.CoreSoftReset and only\napply DCTL.CSftRst when switching from host to device.\n\n[1] https://lore.kernel.org/linux-usb/20210108015115.27920-1-john.stultz@linaro.org/\n[2] https://lore.kernel.org/linux-usb/0ba7a6ba-e6a7-9cd4-0695-64fc927e01f1@gmail.com/",
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-19T07:32:14.412Z",
            orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            shortName: "Linux",
         },
         references: [
            {
               url: "https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50",
            },
            {
               url: "https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b",
            },
            {
               url: "https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3",
            },
            {
               url: "https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9",
            },
         ],
         title: "usb: dwc3: core: Do core softreset when switch mode",
         x_generator: {
            engine: "bippy-5f407fcff5a0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      assignerShortName: "Linux",
      cveId: "CVE-2021-46941",
      datePublished: "2024-02-27T18:40:28.664Z",
      dateReserved: "2024-02-25T13:45:52.721Z",
      dateUpdated: "2024-12-19T07:32:14.412Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      fkie_nvd: {
         configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.12.0\", \"versionEndExcluding\": \"5.10.36\", \"matchCriteriaId\": \"2467C736-2ED6-4BF9-AB1F-D95FFB0AB0A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.11.0\", \"versionEndExcluding\": \"5.11.20\", \"matchCriteriaId\": \"EFB425F0-C28C-4B44-8B4C-AD512AA832DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.12.0\", \"versionEndExcluding\": \"5.12.3\", \"matchCriteriaId\": \"C3814FA3-8141-4313-A852-8C4212BE12AD\"}]}]}]",
         descriptions: "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nusb: dwc3: core: Do core softreset when switch mode\\n\\n\\nAccording to the programming guide, to switch mode for DRD controller,\\nthe driver needs to do the following.\\n\\nTo switch from device to host:\\n1. Reset controller with GCTL.CoreSoftReset\\n2. Set GCTL.PrtCapDir(host mode)\\n3. Reset the host with USBCMD.HCRESET\\n4. Then follow up with the initializing host registers sequence\\n\\nTo switch from host to device:\\n1. Reset controller with GCTL.CoreSoftReset\\n2. Set GCTL.PrtCapDir(device mode)\\n3. Reset the device with DCTL.CSftRst\\n4. Then follow up with the initializing registers sequence\\n\\nCurrently we're missing step 1) to do GCTL.CoreSoftReset and step 3) of\\nswitching from host to device. John Stult reported a lockup issue seen\\nwith HiKey960 platform without these steps[1]. Similar issue is observed\\nwith Ferry's testing platform[2].\\n\\nSo, apply the required steps along with some fixes to Yu Chen's and John\\nStultz's version. The main fixes to their versions are the missing wait\\nfor clocks synchronization before clearing GCTL.CoreSoftReset and only\\napply DCTL.CSftRst when switching from host to device.\\n\\n[1] https://lore.kernel.org/linux-usb/20210108015115.27920-1-john.stultz@linaro.org/\\n[2] https://lore.kernel.org/linux-usb/0ba7a6ba-e6a7-9cd4-0695-64fc927e01f1@gmail.com/\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: dwc3: core: Realiza un reinicio suave del n\\u00facleo al cambiar de modo Seg\\u00fan la gu\\u00eda de programaci\\u00f3n, para cambiar el modo del controlador DRD, el controlador debe hacer lo siguiente. Para cambiar de dispositivo a host: 1. Reinicie el controlador con GCTL.CoreSoftReset 2. Configure GCTL.PrtCapDir (modo de host) 3. Reinicie el host con USBCMD.HCRESET 4. Luego siga con la secuencia de inicializaci\\u00f3n de registros del host Para cambiar de host a dispositivo: 1. Reinicie el controlador con GCTL.CoreSoftReset 2. Configure GCTL.PrtCapDir (modo de dispositivo) 3. Reinicie el dispositivo con DCTL.CSftRst 4. Luego siga con la secuencia de inicializaci\\u00f3n de registros Actualmente nos falta el paso 1) para hacer GCTL .CoreSoftReset y paso 3) de cambio de host a dispositivo. John Stult inform\\u00f3 un problema de bloqueo observado con la plataforma HiKey960 sin estos pasos[1]. Se observa un problema similar con la plataforma de pruebas de Ferry[2]. Entonces, aplique los pasos requeridos junto con algunas correcciones a la versi\\u00f3n de Yu Chen y John Stultz. Las principales correcciones a sus versiones son la falta de espera para la sincronizaci\\u00f3n de los relojes antes de borrar GCTL.CoreSoftReset y solo aplicar DCTL.CSftRst al cambiar de host a dispositivo. [1] https://lore.kernel.org/linux-usb/20210108015115.27920-1-john.stultz@linaro.org/ [2] https://lore.kernel.org/linux-usb/0ba7a6ba-e6a7- 9cd4-0695-64fc927e01f1@gmail.com/\"}]",
         id: "CVE-2021-46941",
         lastModified: "2024-11-21T06:34:59.103",
         metrics: "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}]}",
         published: "2024-02-27T19:04:05.970",
         references: "[{\"url\": \"https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}]",
         sourceIdentifier: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
         vulnStatus: "Modified",
         weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]",
      },
      nvd: "{\"cve\":{\"id\":\"CVE-2021-46941\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-02-27T19:04:05.970\",\"lastModified\":\"2024-11-21T06:34:59.103\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nusb: dwc3: core: Do core softreset when switch mode\\n\\n\\nAccording to the programming guide, to switch mode for DRD controller,\\nthe driver needs to do the following.\\n\\nTo switch from device to host:\\n1. Reset controller with GCTL.CoreSoftReset\\n2. Set GCTL.PrtCapDir(host mode)\\n3. Reset the host with USBCMD.HCRESET\\n4. Then follow up with the initializing host registers sequence\\n\\nTo switch from host to device:\\n1. Reset controller with GCTL.CoreSoftReset\\n2. Set GCTL.PrtCapDir(device mode)\\n3. Reset the device with DCTL.CSftRst\\n4. Then follow up with the initializing registers sequence\\n\\nCurrently we're missing step 1) to do GCTL.CoreSoftReset and step 3) of\\nswitching from host to device. John Stult reported a lockup issue seen\\nwith HiKey960 platform without these steps[1]. Similar issue is observed\\nwith Ferry's testing platform[2].\\n\\nSo, apply the required steps along with some fixes to Yu Chen's and John\\nStultz's version. The main fixes to their versions are the missing wait\\nfor clocks synchronization before clearing GCTL.CoreSoftReset and only\\napply DCTL.CSftRst when switching from host to device.\\n\\n[1] https://lore.kernel.org/linux-usb/20210108015115.27920-1-john.stultz@linaro.org/\\n[2] https://lore.kernel.org/linux-usb/0ba7a6ba-e6a7-9cd4-0695-64fc927e01f1@gmail.com/\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: dwc3: core: Realiza un reinicio suave del núcleo al cambiar de modo Según la guía de programación, para cambiar el modo del controlador DRD, el controlador debe hacer lo siguiente. Para cambiar de dispositivo a host: 1. Reinicie el controlador con GCTL.CoreSoftReset 2. Configure GCTL.PrtCapDir (modo de host) 3. Reinicie el host con USBCMD.HCRESET 4. Luego siga con la secuencia de inicialización de registros del host Para cambiar de host a dispositivo: 1. Reinicie el controlador con GCTL.CoreSoftReset 2. Configure GCTL.PrtCapDir (modo de dispositivo) 3. Reinicie el dispositivo con DCTL.CSftRst 4. Luego siga con la secuencia de inicialización de registros Actualmente nos falta el paso 1) para hacer GCTL .CoreSoftReset y paso 3) de cambio de host a dispositivo. John Stult informó un problema de bloqueo observado con la plataforma HiKey960 sin estos pasos[1]. Se observa un problema similar con la plataforma de pruebas de Ferry[2]. Entonces, aplique los pasos requeridos junto con algunas correcciones a la versión de Yu Chen y John Stultz. Las principales correcciones a sus versiones son la falta de espera para la sincronización de los relojes antes de borrar GCTL.CoreSoftReset y solo aplicar DCTL.CSftRst al cambiar de host a dispositivo. [1] https://lore.kernel.org/linux-usb/20210108015115.27920-1-john.stultz@linaro.org/ [2] https://lore.kernel.org/linux-usb/0ba7a6ba-e6a7- 9cd4-0695-64fc927e01f1@gmail.com/\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.12.0\",\"versionEndExcluding\":\"5.10.36\",\"matchCriteriaId\":\"2467C736-2ED6-4BF9-AB1F-D95FFB0AB0A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11.0\",\"versionEndExcluding\":\"5.11.20\",\"matchCriteriaId\":\"EFB425F0-C28C-4B44-8B4C-AD512AA832DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.12.0\",\"versionEndExcluding\":\"5.12.3\",\"matchCriteriaId\":\"C3814FA3-8141-4313-A852-8C4212BE12AD\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T05:17:43.030Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-46941\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-02-27T20:12:24.351599Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-05T15:20:41.034Z\"}}], \"cna\": {\"title\": \"usb: dwc3: core: Do core softreset when switch mode\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"41ce1456e1dbbc7355d0fcc10cf7c337c13def24\", \"lessThan\": \"fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"41ce1456e1dbbc7355d0fcc10cf7c337c13def24\", \"lessThan\": \"800f58217626c8b147aa40660e572ed8a0d56e3b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"41ce1456e1dbbc7355d0fcc10cf7c337c13def24\", \"lessThan\": \"1c10fd60c8595ea7ff7e29d3cf1fa88069941da3\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"41ce1456e1dbbc7355d0fcc10cf7c337c13def24\", \"lessThan\": \"f88359e1588b85cf0e8209ab7d6620085f3441d9\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/usb/dwc3/core.c\", \"drivers/usb/dwc3/core.h\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.12\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"4.12\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.10.36\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.11.20\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.11.*\"}, {\"status\": \"unaffected\", \"version\": \"5.12.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.12.*\"}, {\"status\": \"unaffected\", \"version\": \"5.13\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/usb/dwc3/core.c\", \"drivers/usb/dwc3/core.h\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50\"}, {\"url\": \"https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b\"}, {\"url\": \"https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3\"}, {\"url\": \"https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nusb: dwc3: core: Do core softreset when switch mode\\n\\n\\nAccording to the programming guide, to switch mode for DRD controller,\\nthe driver needs to do the following.\\n\\nTo switch from device to host:\\n1. Reset controller with GCTL.CoreSoftReset\\n2. Set GCTL.PrtCapDir(host mode)\\n3. Reset the host with USBCMD.HCRESET\\n4. Then follow up with the initializing host registers sequence\\n\\nTo switch from host to device:\\n1. Reset controller with GCTL.CoreSoftReset\\n2. Set GCTL.PrtCapDir(device mode)\\n3. Reset the device with DCTL.CSftRst\\n4. Then follow up with the initializing registers sequence\\n\\nCurrently we're missing step 1) to do GCTL.CoreSoftReset and step 3) of\\nswitching from host to device. John Stult reported a lockup issue seen\\nwith HiKey960 platform without these steps[1]. Similar issue is observed\\nwith Ferry's testing platform[2].\\n\\nSo, apply the required steps along with some fixes to Yu Chen's and John\\nStultz's version. The main fixes to their versions are the missing wait\\nfor clocks synchronization before clearing GCTL.CoreSoftReset and only\\napply DCTL.CSftRst when switching from host to device.\\n\\n[1] https://lore.kernel.org/linux-usb/20210108015115.27920-1-john.stultz@linaro.org/\\n[2] https://lore.kernel.org/linux-usb/0ba7a6ba-e6a7-9cd4-0695-64fc927e01f1@gmail.com/\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T07:32:14.412Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2021-46941\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T07:32:14.412Z\", \"dateReserved\": \"2024-02-25T13:45:52.721Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-02-27T18:40:28.664Z\", \"assignerShortName\": \"Linux\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.