CVE-2021-47276
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/05/2024
Last modified:
30/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ftrace: Do not blindly read the ip address in ftrace_bug()<br />
<br />
It was reported that a bug on arm64 caused a bad ip address to be used for<br />
updating into a nop in ftrace_init(), but the error path (rightfully)<br />
returned -EINVAL and not -EFAULT, as the bug caused more than one error to<br />
occur. But because -EINVAL was returned, the ftrace_bug() tried to report<br />
what was at the location of the ip address, and read it directly. This<br />
caused the machine to panic, as the ip was not pointing to a valid memory<br />
address.<br />
<br />
Instead, read the ip address with copy_from_kernel_nofault() to safely<br />
access the memory, and if it faults, report that the address faulted,<br />
otherwise report what was in that location.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.28 (including) | 4.4.273 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.5 (including) | 4.9.273 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 4.14.237 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.195 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.126 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.44 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.12.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0bc62e398bbd9e600959e610def5109957437b28
- https://git.kernel.org/stable/c/3e4ddeb68751fb4fb657199aed9cfd5d02796875
- https://git.kernel.org/stable/c/4aedc2bc2b32c93555f47c95610efb89cc1ec09b
- https://git.kernel.org/stable/c/6c14133d2d3f768e0a35128faac8aa6ed4815051
- https://git.kernel.org/stable/c/7e4e824b109f1d41ccf223fbb0565d877d6223a2
- https://git.kernel.org/stable/c/862dcc14f2803c556bdd73b43c27b023fafce2fb
- https://git.kernel.org/stable/c/97524384762c1fb9b3ded931498dd2047bd0de81
- https://git.kernel.org/stable/c/acf671ba79c1feccc3ec7cfdcffead4efcec49e7
- https://git.kernel.org/stable/c/0bc62e398bbd9e600959e610def5109957437b28
- https://git.kernel.org/stable/c/3e4ddeb68751fb4fb657199aed9cfd5d02796875
- https://git.kernel.org/stable/c/4aedc2bc2b32c93555f47c95610efb89cc1ec09b
- https://git.kernel.org/stable/c/6c14133d2d3f768e0a35128faac8aa6ed4815051
- https://git.kernel.org/stable/c/7e4e824b109f1d41ccf223fbb0565d877d6223a2
- https://git.kernel.org/stable/c/862dcc14f2803c556bdd73b43c27b023fafce2fb
- https://git.kernel.org/stable/c/97524384762c1fb9b3ded931498dd2047bd0de81
- https://git.kernel.org/stable/c/acf671ba79c1feccc3ec7cfdcffead4efcec49e7



