CVE-2021-47368

Severity CVSS v4.0:
Pending analysis
Type:
CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
Publication date:
21/05/2024
Last modified:
02/04/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> enetc: Fix illegal access when reading affinity_hint<br /> <br /> irq_set_affinity_hit() stores a reference to the cpumask_t<br /> parameter in the irq descriptor, and that reference can be<br /> accessed later from irq_affinity_hint_proc_show(). Since<br /> the cpu_mask parameter passed to irq_set_affinity_hit() has<br /> only temporary storage (it&amp;#39;s on the stack memory), later<br /> accesses to it are illegal. Thus reads from the corresponding<br /> procfs affinity_hint file can result in paging request oops.<br /> <br /> The issue is fixed by the get_cpu_mask() helper, which provides<br /> a permanent storage for the cpumask_t parameter.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.1 (including) 5.4.150 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.70 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.14.9 (excluding)
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*