Lucene search

K
prionPRIOn knowledge basePRION:CVE-2021-47006
HistoryFeb 28, 2024 - 9:15 a.m.

Spoofing

2024-02-2809:15:00
PRIOn knowledge base
www.prio-n.com
12
spoofing
linux kernel
arm
vulnerability
overflow handler

6.7 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

13.1%

In the Linux kernel, the following vulnerability has been resolved:

ARM: 9064/1: hw_breakpoint: Do not directly check the event’s overflow_handler hook

The commit 1879445dfa7b (β€œperf/core: Set event’s default
::overflow_handler()”) set a default event->overflow_handler in
perf_event_alloc(), and replace the check event->overflow_handler with
is_default_overflow_handler(), but one is missing.

Currently, the bp->overflow_handler can not be NULL. As a result,
enable_single_step() is always not invoked.

Comments from Zhen Lei:

https://patchwork.kernel.org/project/linux-arm-kernel/patch/[emailΒ protected]/

6.7 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

13.1%