First published: Tue May 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: enetc: Fix illegal access when reading affinity_hint irq_set_affinity_hit() stores a reference to the cpumask_t parameter in the irq descriptor, and that reference can be accessed later from irq_affinity_hint_proc_show(). Since the cpu_mask parameter passed to irq_set_affinity_hit() has only temporary storage (it's on the stack memory), later accesses to it are illegal. Thus reads from the corresponding procfs affinity_hint file can result in paging request oops. The issue is fixed by the get_cpu_mask() helper, which provides a permanent storage for the cpumask_t parameter.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=5.1<5.4.150 | |
Linux Kernel | >=5.5<5.10.70 | |
Linux Kernel | >=5.11<5.14.9 | |
Linux Kernel | =5.15-rc1 | |
Linux Kernel | =5.15-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47368 is classified as a high severity vulnerability due to its impact on the Linux kernel's security and stability.
To fix CVE-2021-47368, update your Linux kernel to the latest version that contains the patch for this vulnerability.
CVE-2021-47368 affects versions of the Linux kernel between 5.1 and 5.15-rc2, including several specific versions within that range.
CVE-2021-47368 is an illegal access vulnerability related to reading affinity hints in the Linux kernel.
As of the last update, there have been no public reports of active exploitation of CVE-2021-47368, but it is advisable to mitigate the risk by applying the necessary patches.