CVE-2021-47202
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
10/04/2024
Last modified:
14/01/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
thermal: Fix NULL pointer dereferences in of_thermal_ functions<br />
<br />
of_parse_thermal_zones() parses the thermal-zones node and registers a<br />
thermal_zone device for each subnode. However, if a thermal zone is<br />
consuming a thermal sensor and that thermal sensor device hasn&#39;t probed<br />
yet, an attempt to set trip_point_*_temp for that thermal zone device<br />
can cause a NULL pointer dereference. Fix it.<br />
<br />
console:/sys/class/thermal/thermal_zone87 # echo 120000 > trip_point_0_temp<br />
...<br />
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000020<br />
...<br />
Call trace:<br />
of_thermal_set_trip_temp+0x40/0xc4<br />
trip_point_temp_store+0xc0/0x1dc<br />
dev_attr_store+0x38/0x88<br />
sysfs_kf_write+0x64/0xc0<br />
kernfs_fop_write_iter+0x108/0x1d0<br />
vfs_write+0x2f4/0x368<br />
ksys_write+0x7c/0xec<br />
__arm64_sys_write+0x20/0x30<br />
el0_svc_common.llvm.7279915941325364641+0xbc/0x1bc<br />
do_el0_svc+0x28/0xa0<br />
el0_svc+0x14/0x24<br />
el0_sync_handler+0x88/0xec<br />
el0_sync+0x1c0/0x200<br />
<br />
While at it, fix the possible NULL pointer dereference in other<br />
functions as well: of_thermal_get_temp(), of_thermal_set_emul_temp(),<br />
of_thermal_get_trend().
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4.210 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.81 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.14.21 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15 (including) | 5.15.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0750f769b95841b34a9fe8c418dd792ff526bf86
- https://git.kernel.org/stable/c/6a315471cb6a07f651e1d3adc8962730f4fcccac
- https://git.kernel.org/stable/c/828f4c31684da94ecf0b44a2cbd35bbede04f0bd
- https://git.kernel.org/stable/c/96cfe05051fd8543cdedd6807ec59a0e6c409195
- https://git.kernel.org/stable/c/ef2590a5305e0b8e9342f84c2214aa478ee7f28e
- https://git.kernel.org/stable/c/0750f769b95841b34a9fe8c418dd792ff526bf86
- https://git.kernel.org/stable/c/6a315471cb6a07f651e1d3adc8962730f4fcccac
- https://git.kernel.org/stable/c/828f4c31684da94ecf0b44a2cbd35bbede04f0bd
- https://git.kernel.org/stable/c/96cfe05051fd8543cdedd6807ec59a0e6c409195
- https://git.kernel.org/stable/c/ef2590a5305e0b8e9342f84c2214aa478ee7f28e



