CVE-2021-47006

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-47006
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47006.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-47006
Related
Published
2024-02-28T09:15:38Z
Modified
2024-11-07T16:35:03Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

ARM: 9064/1: hwbreakpoint: Do not directly check the event's overflowhandler hook

The commit 1879445dfa7b ("perf/core: Set event's default ::overflowhandler()") set a default event->overflowhandler in perfeventalloc(), and replace the check event->overflowhandler with isdefaultoverflowhandler(), but one is missing.

Currently, the bp->overflowhandler can not be NULL. As a result, enablesingle_step() is always not invoked.

Comments from Zhen Lei:

https://patchwork.kernel.org/project/linux-arm-kernel/patch/20210207105934.2001-1-thunder.leizhen@huawei.com/

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.38-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.38-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.38-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}