摘要:
In the Linux kernel, the following vulnerability has been resolved:
powerpc/32: Fix hardlockup on vmap stack overflow
Since the commit c118c7303ad5 ("powerpc/32: Fix vmap stack - Do not
activate MMU before reading task struct") a vmap stack overflow
results in a hard lockup. This is because emergency_ctx is still
addressed with its virtual address allthough data MMU is not active
anymore at that time.
Fix it by using a physical address instead.
安全等级: Low
公告ID: KylinSec-SA-2024-2838
发布日期: 2024年6月20日
关联CVE: CVE-2021-47567
In the Linux kernel, the following vulnerability has been resolved:
powerpc/32: Fix hardlockup on vmap stack overflow
Since the commit c118c7303ad5 ("powerpc/32: Fix vmap stack - Do not
activate MMU before reading task struct") a vmap stack overflow
results in a hard lockup. This is because emergency_ctx is still
addressed with its virtual address allthough data MMU is not active
anymore at that time.
Fix it by using a physical address instead.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2021-47567 | KY3.4-5A | kernel | Unaffected |
CVE-2021-47567 | KY3.5.2 | kernel | Unaffected |
CVE-2021-47567 | V6 | kernel | Unaffected |