目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1020

100%

CVE-2021-47393— Linux kernel 安全漏洞

EPSS 0.05% · P17

影响版本矩阵 12

厂商产品版本范围状态
LinuxLinux65afb4c8e7e4e7e74b28efa1df62da503ca3e7a6< 5c6e0bce647d9cb32a17d58ffa669b3421fcc6caaffected
65afb4c8e7e4e7e74b28efa1df62da503ca3e7a6< a6c42ae1530f94724d3c42cf91fe3d3c5e394f8aaffected
65afb4c8e7e4e7e74b28efa1df62da503ca3e7a6< 76bbb482d33bfcd7e9070ecf594c9ec73e01c930affected
65afb4c8e7e4e7e74b28efa1df62da503ca3e7a6< aa85fb7bde558bb2e364e85976b14b259c8b6fe8affected
65afb4c8e7e4e7e74b28efa1df62da503ca3e7a6< e6fab7af6ba1bc77c78713a83876f60ca7a4a064affected
4.19affected
< 4.19unaffected
4.19.209≤ 4.19.*unaffected
… +4 条更多
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2021-47393 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs Fan speed minimum can be enforced from sysfs. For example, setting current fan speed to 20 is used to enforce fan speed to be at 100% speed, 19 - to be not below 90% speed, etcetera. This feature provides ability to limit fan speed according to some system wise considerations, like absence of some replaceable units or high system ambient temperature. Request for changing fan minimum speed is configuration request and can be set only through 'sysfs' write procedure. In this situation value of argument 'state' is above nominal fan speed maximum. Return non-zero code in this case to avoid thermal_cooling_device_stats_update() call, because in this case statistics update violates thermal statistics table range. The issues is observed in case kernel is configured with option CONFIG_THERMAL_STATISTICS. Here is the trace from KASAN: [ 159.506659] BUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x7d/0xb0 [ 159.516016] Read of size 4 at addr ffff888116163840 by task hw-management.s/7444 [ 159.545625] Call Trace: [ 159.548366] dump_stack+0x92/0xc1 [ 159.552084] ? thermal_cooling_device_stats_update+0x7d/0xb0 [ 159.635869] thermal_zone_device_update+0x345/0x780 [ 159.688711] thermal_zone_device_set_mode+0x7d/0xc0 [ 159.694174] mlxsw_thermal_modules_init+0x48f/0x590 [mlxsw_core] [ 159.700972] ? mlxsw_thermal_set_cur_state+0x5a0/0x5a0 [mlxsw_core] [ 159.731827] mlxsw_thermal_init+0x763/0x880 [mlxsw_core] [ 160.070233] RIP: 0033:0x7fd995909970 [ 160.074239] Code: 73 01 c3 48 8b 0d 28 d5 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 99 2d 2c 00 00 75 10 b8 01 00 00 00 0f 05 <48> 3d 01 f0 ff .. [ 160.095242] RSP: 002b:00007fff54f5d938 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 160.103722] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 00007fd995909970 [ 160.111710] RDX: 0000000000000013 RSI: 0000000001906008 RDI: 0000000000000001 [ 160.119699] RBP: 0000000001906008 R08: 00007fd995bc9760 R09: 00007fd996210700 [ 160.127687] R10: 0000000000000073 R11: 0000000000000246 R12: 0000000000000013 [ 160.135673] R13: 0000000000000001 R14: 00007fd995bc8600 R15: 0000000000000013 [ 160.143671] [ 160.145338] Allocated by task 2924: [ 160.149242] kasan_save_stack+0x19/0x40 [ 160.153541] __kasan_kmalloc+0x7f/0xa0 [ 160.157743] __kmalloc+0x1a2/0x2b0 [ 160.161552] thermal_cooling_device_setup_sysfs+0xf9/0x1a0 [ 160.167687] __thermal_cooling_device_register+0x1b5/0x500 [ 160.173833] devm_thermal_of_cooling_device_register+0x60/0xa0 [ 160.180356] mlxreg_fan_probe+0x474/0x5e0 [mlxreg_fan] [ 160.248140] [ 160.249807] The buggy address belongs to the object at ffff888116163400 [ 160.249807] which belongs to the cache kmalloc-1k of size 1024 [ 160.263814] The buggy address is located 64 bytes to the right of [ 160.263814] 1024-byte region [ffff888116163400, ffff888116163800) [ 160.277536] The buggy address belongs to the page: [ 160.282898] page:0000000012275840 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888116167000 pfn:0x116160 [ 160.294872] head:0000000012275840 order:3 compound_mapcount:0 compound_pincount:0 [ 160.303251] flags: 0x200000000010200(slab|head|node=0|zone=2) [ 160.309694] raw: 0200000000010200 ffffea00046f7208 ffffea0004928208 ffff88810004dbc0 [ 160.318367] raw: ffff888116167000 00000000000a0006 00000001ffffffff 0000000000000000 [ 160.327033] page dumped because: kasan: bad access detected [ 160.333270] [ 160.334937] Memory state around the buggy address: [ 160.356469] >ffff888116163800: fc ..
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Linux kernel 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于hwmon模块从sysfs强制执行风扇当前状态时返回非零值。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

受影响产品

厂商产品影响版本CPE订阅
LinuxLinux 65afb4c8e7e4e7e74b28efa1df62da503ca3e7a6 ~ 5c6e0bce647d9cb32a17d58ffa669b3421fcc6ca -
LinuxLinux 4.19 -

二、漏洞 CVE-2021-47393 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2021-47393 的情报信息

登录查看更多情报信息。

同批安全公告 · Linux · 2024-05-21 · 共 361 条

CVE-2021-47432Linux kernel 安全漏洞
CVE-2023-52760Linux kernel 安全漏洞
CVE-2023-52757Linux kernel 安全漏洞
CVE-2023-52755Linux kernel 安全漏洞
CVE-2023-52754Linux kernel 安全漏洞
CVE-2023-52753Linux kernel 安全漏洞
CVE-2023-52752Linux kernel 安全漏洞
CVE-2023-52751Linux kernel 安全漏洞
CVE-2023-52750Linux kernel安全漏洞
CVE-2023-52749Linux kernel 安全漏洞
CVE-2023-52748Linux kernel 安全漏洞
CVE-2022-48710Linux kernel 安全漏洞
CVE-2023-52742Linux kernel安全漏洞
CVE-2023-52738Linux kernel安全漏洞
CVE-2023-52740Linux kernel 安全漏洞
CVE-2023-52739Linux kernel安全漏洞
CVE-2023-52741Linux kernel 安全漏洞
CVE-2023-52743Linux kernel 安全漏洞
CVE-2023-52746Linux kernel 安全漏洞
CVE-2023-52747Linux kernel 安全漏洞

显示前 20 条,共 361 条。 查看全部 &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2021-47393

暂无评论


发表评论