CVE-2021-47640

CVE-2021-47640

Título es
CVE-2021-47640

Mié, 26/02/2025 – 06:37

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2021-47640

Descripción en
In the Linux kernel, the following vulnerability has been resolved:

powerpc/kasan: Fix early region not updated correctly

The shadow's page table is not updated when PTE_RPN_SHIFT is 24
and PAGE_SHIFT is 12. It not only causes false positives but
also false negative as shown the following text.

Fix it by bringing the logic of kasan_early_shadow_page_entry here.

1. False Positive:
==================================================================
BUG: KASAN: vmalloc-out-of-bounds in pcpu_alloc+0x508/0xa50
Write of size 16 at addr f57f3be0 by task swapper/0/1

CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.15.0-12267-gdebe436e77c7 #1
Call Trace:
[c80d1c20] [c07fe7b8] dump_stack_lvl+0x4c/0x6c (unreliable)
[c80d1c40] [c02ff668] print_address_description.constprop.0+0x88/0x300
[c80d1c70] [c02ff45c] kasan_report+0x1ec/0x200
[c80d1cb0] [c0300b20] kasan_check_range+0x160/0x2f0
[c80d1cc0] [c03018a4] memset+0x34/0x90
[c80d1ce0] [c0280108] pcpu_alloc+0x508/0xa50
[c80d1d40] [c02fd7bc] __kmem_cache_create+0xfc/0x570
[c80d1d70] [c0283d64] kmem_cache_create_usercopy+0x274/0x3e0
[c80d1db0] [c2036580] init_sd+0xc4/0x1d0
[c80d1de0] [c00044a0] do_one_initcall+0xc0/0x33c
[c80d1eb0] [c2001624] kernel_init_freeable+0x2c8/0x384
[c80d1ef0] [c0004b14] kernel_init+0x24/0x170
[c80d1f10] [c001b26c] ret_from_kernel_thread+0x5c/0x64

Memory state around the buggy address:
f57f3a80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
f57f3b00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
>f57f3b80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
^
f57f3c00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
f57f3c80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
==================================================================

2. False Negative (with KASAN tests):
==================================================================
Before fix:
ok 45 – kmalloc_double_kzfree
# vmalloc_oob: EXPECTATION FAILED at lib/test_kasan.c:1039
KASAN failure expected in "((volatile char *)area)[3100]", but none occurred
not ok 46 – vmalloc_oob
not ok 1 – kasan

==================================================================
After fix:
ok 1 – kasan

26/02/2025

26/02/2025

Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
Pendiente de análisis

Referencias


  • https://git.kernel.org/stable/c/5a3d8f3192a409893c57808cc935e16484df1068

  • https://git.kernel.org/stable/c/7f19245c3647afea8c7c41f795506ef70f64b9f2

  • https://git.kernel.org/stable/c/dd75080aa8409ce10d50fb58981c6b59bf8707d3

  • https://git.kernel.org/stable/c/de56beace6648065d404cd9835aa7d30e3df519d

  • https://git.kernel.org/stable/c/e3d157a4b4f4e0268c98be5b7013bf4b31234bb6

  • https://git.kernel.org/stable/c/f39a3309393a4a484532f6ba745c6acbcfe06115
  • Enviar en el boletín
    Off

    CVE-2021-47639

    CVE-2021-47639

    Título es
    CVE-2021-47639

    Mié, 26/02/2025 – 06:37

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2021-47639

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU

    Zap both valid and invalid roots when zapping/unmapping a gfn range, as
    KVM must ensure it holds no references to the freed page after returning
    from the unmap operation. Most notably, the TDP MMU doesn't zap invalid
    roots in mmu_notifier callbacks. This leads to use-after-free and other
    issues if the mmu_notifier runs to completion while an invalid root
    zapper yields as KVM fails to honor the requirement that there must be
    _no_ references to the page after the mmu_notifier returns.

    The bug is most easily reproduced by hacking KVM to cause a collision
    between set_nx_huge_pages() and kvm_mmu_notifier_release(), but the bug
    exists between kvm_mmu_notifier_invalidate_range_start() and memslot
    updates as well. Invalidating a root ensures pages aren't accessible by
    the guest, and KVM won't read or write page data itself, but KVM will
    trigger e.g. kvm_set_pfn_dirty() when zapping SPTEs, and thus completing
    a zap of an invalid root _after_ the mmu_notifier returns is fatal.

    WARNING: CPU: 24 PID: 1496 at arch/x86/kvm/../../../virt/kvm/kvm_main.c:173 [kvm]
    RIP: 0010:kvm_is_zone_device_pfn+0x96/0xa0 [kvm]
    Call Trace:

    kvm_set_pfn_dirty+0xa8/0xe0 [kvm]
    __handle_changed_spte+0x2ab/0x5e0 [kvm]
    __handle_changed_spte+0x2ab/0x5e0 [kvm]
    __handle_changed_spte+0x2ab/0x5e0 [kvm]
    zap_gfn_range+0x1f3/0x310 [kvm]
    kvm_tdp_mmu_zap_invalidated_roots+0x50/0x90 [kvm]
    kvm_mmu_zap_all_fast+0x177/0x1a0 [kvm]
    set_nx_huge_pages+0xb4/0x190 [kvm]
    param_attr_store+0x70/0x100
    module_attr_store+0x19/0x30
    kernfs_fop_write_iter+0x119/0x1b0
    new_sync_write+0x11c/0x1b0
    vfs_write+0x1cc/0x270
    ksys_write+0x5f/0xe0
    do_syscall_64+0x38/0xc0
    entry_SYSCALL_64_after_hwframe+0x44/0xae

    26/02/2025

    26/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/0c8a8da182d4333d9bbb9131d765145568c847b2

  • https://git.kernel.org/stable/c/8cf6f98ab1d16d5e607635a0c21c4231eb15367e

  • https://git.kernel.org/stable/c/af47248407c0c5ae52a752af1ab5ce5b0db91502

  • https://git.kernel.org/stable/c/d62007edf01f5c11f75d0f4b1e538fc52a5b1982
  • Enviar en el boletín
    Off

    CVE-2021-47648

    CVE-2021-47648

    Título es
    CVE-2021-47648

    Mié, 26/02/2025 – 06:37

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2021-47648

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    gpu: host1x: Fix a memory leak in 'host1x_remove()'

    Add a missing 'host1x_channel_list_free()' call in the remove function,
    as already done in the error handling path of the probe function.

    26/02/2025

    26/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/025c6643a81564f066d8381b9e2f4603e0f8438f

  • https://git.kernel.org/stable/c/5124a344983e1b9670dae7add0e4d00d589aabcd

  • https://git.kernel.org/stable/c/6bb107332db28a0e9256c2d36a0902b85307612c

  • https://git.kernel.org/stable/c/c06577a80485511b894cb688e881ef0bc2d1d296

  • https://git.kernel.org/stable/c/fe1ce680560d4f0049ffa0c687de17567421c1ec
  • Enviar en el boletín
    Off

    CVE-2021-47647

    CVE-2021-47647

    Título es
    CVE-2021-47647

    Mié, 26/02/2025 – 06:37

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2021-47647

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    clk: qcom: ipq8074: fix PCI-E clock oops

    Fix PCI-E clock related kernel oops that are caused by a missing clock
    parent.

    pcie0_rchng_clk_src has num_parents set to 2 but only one parent is
    actually set via parent_hws, it should also have "XO" defined.
    This will cause the kernel to panic on a NULL pointer in
    clk_core_get_parent_by_index().

    So, to fix this utilize clk_parent_data to provide gcc_xo_gpll0 parent
    data.
    Since there is already an existing static const char * const gcc_xo_gpll0[]
    used to provide the same parents via parent_names convert those users to
    clk_parent_data as well.

    Without this earlycon is needed to even catch the OOPS as it will reset
    the board before serial is initialized with the following:

    [ 0.232279] Unable to handle kernel paging request at virtual address 0000a00000000000
    [ 0.232322] Mem abort info:
    [ 0.239094] ESR = 0x96000004
    [ 0.241778] EC = 0x25: DABT (current EL), IL = 32 bits
    [ 0.244908] SET = 0, FnV = 0
    [ 0.250377] EA = 0, S1PTW = 0
    [ 0.253236] FSC = 0x04: level 0 translation fault
    [ 0.256277] Data abort info:
    [ 0.261141] ISV = 0, ISS = 0x00000004
    [ 0.264262] CM = 0, WnR = 0
    [ 0.267820] [0000a00000000000] address between user and kernel address ranges
    [ 0.270954] Internal error: Oops: 96000004 [#1] SMP
    [ 0.278067] Modules linked in:
    [ 0.282751] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 5.15.10 #0
    [ 0.285882] Hardware name: Xiaomi AX3600 (DT)
    [ 0.292043] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=–)
    [ 0.296299] pc : clk_core_get_parent_by_index+0x68/0xec
    [ 0.303067] lr : __clk_register+0x1d8/0x820
    [ 0.308273] sp : ffffffc01111b7d0
    [ 0.312438] x29: ffffffc01111b7d0 x28: 0000000000000000 x27: 0000000000000040
    [ 0.315919] x26: 0000000000000002 x25: 0000000000000000 x24: ffffff8000308800
    [ 0.323037] x23: ffffff8000308850 x22: ffffff8000308880 x21: ffffff8000308828
    [ 0.330155] x20: 0000000000000028 x19: ffffff8000309700 x18: 0000000000000020
    [ 0.337272] x17: 000000005cc86990 x16: 0000000000000004 x15: ffffff80001d9d0a
    [ 0.344391] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000006
    [ 0.351508] x11: 0000000000000003 x10: 0101010101010101 x9 : 0000000000000000
    [ 0.358626] x8 : 7f7f7f7f7f7f7f7f x7 : 6468626f5e626266 x6 : 17000a3a403c1b06
    [ 0.365744] x5 : 061b3c403a0a0017 x4 : 0000000000000000 x3 : 0000000000000001
    [ 0.372863] x2 : 0000a00000000000 x1 : 0000000000000001 x0 : ffffff8000309700
    [ 0.379982] Call trace:
    [ 0.387091] clk_core_get_parent_by_index+0x68/0xec
    [ 0.389351] __clk_register+0x1d8/0x820
    [ 0.394210] devm_clk_hw_register+0x5c/0xe0
    [ 0.398030] devm_clk_register_regmap+0x44/0x8c
    [ 0.402198] qcom_cc_really_probe+0x17c/0x1d0
    [ 0.406711] qcom_cc_probe+0x34/0x44
    [ 0.411224] gcc_ipq8074_probe+0x18/0x30
    [ 0.414869] platform_probe+0x68/0xe0
    [ 0.418776] really_probe.part.0+0x9c/0x30c
    [ 0.422336] __driver_probe_device+0x98/0x144
    [ 0.426329] driver_probe_device+0x44/0x11c
    [ 0.430842] __device_attach_driver+0xb4/0x120
    [ 0.434836] bus_for_each_drv+0x68/0xb0
    [ 0.439349] __device_attach+0xb0/0x170
    [ 0.443081] device_initial_probe+0x14/0x20
    [ 0.446901] bus_probe_device+0x9c/0xa4
    [ 0.451067] device_add+0x35c/0x834
    [ 0.454886] of_device_add+0x54/0x64
    [ 0.458360] of_platform_device_create_pdata+0xc0/0x100
    [ 0.462181] of_platform_bus_create+0x114/0x370
    [ 0.467128] of_platform_bus_create+0x15c/0x370
    [ 0.471641] of_platform_populate+0x50/0xcc
    [ 0.476155] of_platform_default_populate_init+0xa8/0xc8
    [ 0.480324] do_one_initcall+0x50/0x1b0
    [ 0.485877] kernel_init_freeable+0x234/0x29c
    [ 0.489436] kernel_init+0x24/0x120
    [ 0.493948] ret_from_fork+0x10/0x20
    [ 0.497253] Code: d50323bf d65f03c0 f94002a2 b4000302 (f9400042)
    [ 0.501079] —[ end trace 4ca7e1129da2abce ]—

    26/02/2025

    26/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/41e360fa73a4c2f5b78f5ded78a5375b08c206a5

  • https://git.kernel.org/stable/c/5a5576ad405c3c89fc9afb245c4dcc3e412b0aa9

  • https://git.kernel.org/stable/c/8b89c9e68a01a19a1dd689a42aa65d545e931899

  • https://git.kernel.org/stable/c/bf8f5182b8f59309809b41c1d1730ed9ca6134b1

  • https://git.kernel.org/stable/c/d02b3d4a8c525068bc5cfb4341e0023d8eb82ace
  • Enviar en el boletín
    Off

    CVE-2021-47646

    CVE-2021-47646

    Título es
    CVE-2021-47646

    Mié, 26/02/2025 – 06:37

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2021-47646

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    Revert "Revert "block, bfq: honor already-setup queue merges""

    A crash [1] happened to be triggered in conjunction with commit
    2d52c58b9c9b ("block, bfq: honor already-setup queue merges"). The
    latter was then reverted by commit ebc69e897e17 ("Revert "block, bfq:
    honor already-setup queue merges""). Yet, the reverted commit was not
    the one introducing the bug. In fact, it actually triggered a UAF
    introduced by a different commit, and now fixed by commit d29bd41428cf
    ("block, bfq: reset last_bfqq_created on group change").

    So, there is no point in keeping commit 2d52c58b9c9b ("block, bfq:
    honor already-setup queue merges") out. This commit restores it.

    [1] https://bugzilla.kernel.org/show_bug.cgi?id=214503

    26/02/2025

    26/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/15729ff8143f8135b03988a100a19e66d7cb7ecd

  • https://git.kernel.org/stable/c/4083925bd6dc89216d156474a8076feec904e607

  • https://git.kernel.org/stable/c/65d8a737452e88f251fe5d925371de6d606df613

  • https://git.kernel.org/stable/c/931aff627469a75c77b9fd3823146d0575afffd6

  • https://git.kernel.org/stable/c/abc2129e646af7b43025d90a071f83043f1ae76c

  • https://git.kernel.org/stable/c/cc051f497eac9d8a0d816cd4bffa3415f2724871

  • https://git.kernel.org/stable/c/f990f0985eda59d4f29fc83fcf300c92b1225d39
  • Enviar en el boletín
    Off

    CVE-2021-47645

    CVE-2021-47645

    Título es
    CVE-2021-47645

    Mié, 26/02/2025 – 06:37

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2021-47645

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com

    On the case tmp_dcim=1, the index of buffer is miscalculated.
    This generate a NULL pointer dereference later.

    So let's fix the calcul and add a check to prevent this to reappear.

    26/02/2025

    26/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/20811bbe685ca3eddd34b0c750860427d7030910

  • https://git.kernel.org/stable/c/20db2ed1e2f9fcd417fa67853e5154f0c2537d6c

  • https://git.kernel.org/stable/c/7e76f3ed7ab2ae026c6ef9cc23096a7554af8c52

  • https://git.kernel.org/stable/c/bafec1a6ba4b187a7fcdcfce0faebdc623d4ef8e

  • https://git.kernel.org/stable/c/e3b86f4e558cea9eed71d894df2f19b10d60a207
  • Enviar en el boletín
    Off

    CVE-2021-47644

    CVE-2021-47644

    Título es
    CVE-2021-47644

    Mié, 26/02/2025 – 06:37

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2021-47644

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    media: staging: media: zoran: move videodev alloc

    Move some code out of zr36057_init() and create new functions for handling
    zr->video_dev. This permit to ease code reading and fix a zr->video_dev
    memory leak.

    26/02/2025

    26/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/1e501ec38796f43e995731d1bcd4173cb1ccfce0

  • https://git.kernel.org/stable/c/82e3a496eb56da0b9f29fdc5b63cedb3289e91de

  • https://git.kernel.org/stable/c/bd01629315ffd5b63da91d0bd529a77d30e55028

  • https://git.kernel.org/stable/c/c1ba65100a359fe28cfe37e09e10c99f247cbf1e

  • https://git.kernel.org/stable/c/ff3357bffd9fb78f59762d8955afc7382a279079
  • Enviar en el boletín
    Off

    CVE-2021-47643

    CVE-2021-47643

    Título es
    CVE-2021-47643

    Mié, 26/02/2025 – 06:37

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2021-47643

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    media: ir_toy: free before error exiting

    Fix leak in error path.

    26/02/2025

    26/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/2011363c196846c083649c91ed30aeef64358d52

  • https://git.kernel.org/stable/c/382e0f6958ef34eb093127b6d74c12f3b8fd0904

  • https://git.kernel.org/stable/c/52cdb013036391d9d87aba5b4fc49cdfc6ea4b23

  • https://git.kernel.org/stable/c/93ef3fdf3b6633c58f049e5a6be755777dde4340

  • https://git.kernel.org/stable/c/99e3f83539cac6884a4df02cb204a57a184ea12b
  • Enviar en el boletín
    Off

    CVE-2025-0760

    CVE-2025-0760

    Título es
    CVE-2025-0760

    Mié, 26/02/2025 – 00:15

    Tipo
    CWE-522

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-0760

    Descripción en
    A Credential Disclosure vulnerability exists where an administrator could extract the stored SMTP account credentials due to lack of encryption.

    26/02/2025

    26/02/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    2.70

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    LOW

    Referencias


  • https://www.tenable.com/security/tns-2025-01
  • Enviar en el boletín
    Off

    CVE-2025-1091

    CVE-2025-1091

    Título es
    CVE-2025-1091

    Mié, 26/02/2025 – 00:15

    Tipo
    CWE-862

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-1091

    Descripción en
    A Broken Authorization schema exists where any authenticated user could download IOA script and configuration files if the URL is known.

    26/02/2025

    26/02/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    4.30

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Referencias


  • https://www.tenable.com/security/tns-2025-01
  • Enviar en el boletín
    Off