First published: Tue May 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ftrace: Do not blindly read the ip address in ftrace_bug() It was reported that a bug on arm64 caused a bad ip address to be used for updating into a nop in ftrace_init(), but the error path (rightfully) returned -EINVAL and not -EFAULT, as the bug caused more than one error to occur. But because -EINVAL was returned, the ftrace_bug() tried to report what was at the location of the ip address, and read it directly. This caused the machine to panic, as the ip was not pointing to a valid memory address. Instead, read the ip address with copy_from_kernel_nofault() to safely access the memory, and if it faults, report that the address faulted, otherwise report what was in that location.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel | ||
Linux Kernel | >=2.6.28<4.4.273 | |
Linux Kernel | >=4.5<4.9.273 | |
Linux Kernel | >=4.10<4.14.237 | |
Linux Kernel | >=4.15<4.19.195 | |
Linux Kernel | >=4.20<5.4.126 | |
Linux Kernel | >=5.5<5.10.44 | |
Linux Kernel | >=5.11<5.12.11 | |
Linux Kernel | =5.13-rc1 | |
Linux Kernel | =5.13-rc2 | |
Linux Kernel | =5.13-rc3 | |
Linux Kernel | =5.13-rc4 | |
Linux Kernel | =5.13-rc5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47276 has not been assigned a CVSS score, but it is considered a serious issue due to potential impact on system stability.
To fix CVE-2021-47276, upgrade the Linux kernel to a version that includes the applied patch.
CVE-2021-47276 affects various versions of the Linux kernel, specifically versions from 2.6.28 to 5.13-rc5.
CVE-2021-47276 is a vulnerability in the ftrace subsystem of the Linux kernel related to improper handling of instruction pointer addresses.
CVE-2021-47276 requires local access to exploit, making remote exploitation challenging.