![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2021-47618 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
ARM: 9170/1: fix panic when kasan and kprobe are enabled arm32 uses
software to simulate the instruction replaced by kprobe. some
instructions may be simulated by constructing assembly functions.
therefore, before executing instruction simulation, it is necessary to
construct assembly function execution environment in C language
through binding registers. after kasan is enabled, the register
binding relationship will be destroyed, resulting in instruction
simulation errors and causing kernel panic. the kprobe emulate
instruction function is distributed in three files: actions-common.c
actions-arm.c actions-thumb.c, so disable KASAN when compiling these
files. for example, use kprobe insert on cap_capable+20 after kasan
enabled, the cap_capable assembly code is as follows: |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2021-47618 https://git.kernel.org/stable/c/1515e72aae803fc6b466adf918e71c4e4c9d5b3d https://git.kernel.org/stable/c/1515e72aae803fc6b466adf918e71c4e4c9d5b3d https://git.kernel.org/stable/c/8b59b0a53c840921b625378f137e88adfa87647e https://git.kernel.org/stable/c/8b59b0a53c840921b625378f137e88adfa87647e https://git.kernel.org/stable/c/ba1863be105b06e10d0e2f6b1b8a0570801cfc71 https://git.kernel.org/stable/c/ba1863be105b06e10d0e2f6b1b8a0570801cfc71 |