跳转到帖子

Debian: CVE-2021-47368: linux -- security update

recommended_posts

发布于
  • Members

Debian: CVE-2021-47368: linux -- security update

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
05/21/2024
Created
07/31/2024
Added
07/30/2024
Modified
07/30/2024

Description

In the Linux kernel, the following vulnerability has been resolved: enetc: Fix illegal access when reading affinity_hint irq_set_affinity_hit() stores a reference to the cpumask_t parameter in the irq descriptor, and that reference can be accessed later from irq_affinity_hint_proc_show(). Since the cpu_mask parameter passed to irq_set_affinity_hit() has only temporary storage (it's on the stack memory), later accesses to it are illegal. Thus reads from the corresponding procfs affinity_hint file can result in paging request oops. The issue is fixed by the get_cpu_mask() helper, which provides a permanent storage for the cpumask_t parameter.

Solution(s)

  • debian-upgrade-linux

References

  • https://attackerkb.com/topics/cve-2021-47368
  • CVE - 2021-47368
  • 查看数 701
  • 已创建
  • 最后回复