Lucene search

K
nvd416baaa9-dc9f-4396-8d5f-8c081fb06d67NVD:CVE-2021-47006
HistoryFeb 28, 2024 - 9:15 a.m.

CVE-2021-47006

2024-02-2809:15:38
416baaa9-dc9f-4396-8d5f-8c081fb06d67
web.nvd.nist.gov
linux kernel
arm
breakpoint
vulnerability
fixed
overflow handler

7.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.1%

In the Linux kernel, the following vulnerability has been resolved:

ARM: 9064/1: hw_breakpoint: Do not directly check the event’s overflow_handler hook

The commit 1879445dfa7b (“perf/core: Set event’s default
::overflow_handler()”) set a default event->overflow_handler in
perf_event_alloc(), and replace the check event->overflow_handler with
is_default_overflow_handler(), but one is missing.

Currently, the bp->overflow_handler can not be NULL. As a result,
enable_single_step() is always not invoked.

Comments from Zhen Lei:

https://patchwork.kernel.org/project/linux-arm-kernel/patch/[email protected]/

7.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.1%