iommu/mediatek:恢复时始终启用 clk (CVE-2021-47025)

admin 2024-03-01 10:39:06 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
iommu/mediatek:恢复时始终启用 clk (CVE-2021-47025)

CVE编号

CVE-2021-47025

利用情况

暂无

补丁情况

N/A

披露时间

2024-02-28
漏洞描述
In the Linux kernel, the following vulnerability has been resolved: iommu/mediatek: Always enable the clk on resume In mtk_iommu_runtime_resume always enable the clk, even if m4u_dom is null. Otherwise the 'suspend' cb might disable the clk which is already disabled causing the warning: [1.586104] infra_m4u already disabled [1.586133] WARNING: CPU: 0 PID: 121 at drivers/clk/clk.c:952 clk_core_disable+0xb0/0xb8 [1.594391] mtk-iommu 10205000.iommu: bound 18001000.larb (ops mtk_smi_larb_component_ops) [1.598108] Modules linked in: [1.598114] CPU: 0 PID: 121 Comm: kworker/0:2 Not tainted 5.12.0-rc5 #69 [1.609246] mtk-iommu 10205000.iommu: bound 14027000.larb (ops mtk_smi_larb_component_ops) [1.617487] Hardware name: Google Elm (DT) [1.617491] Workqueue: pm pm_runtime_work [1.620545] mtk-iommu 10205000.iommu: bound 19001000.larb (ops mtk_smi_larb_component_ops) [1.627229] pstate: 60000085 (nZCv daIf -PAN -UAO -TCO BTYPE=--) [1.659297] pc : clk_core_disable+0xb0/0xb8 [1.663475] lr : clk_core_disable+0xb0/0xb8 [1.667652] sp : ffff800011b9bbe0 [1.670959] x29: ffff800011b9bbe0 x28: 0000000000000000 [1.676267] x27: ffff800011448000 x26: ffff8000100cfd98 [1.681574] x25: ffff800011b9bd48 x24: 0000000000000000 [1.686882] x23: 0000000000000000 x22: ffff8000106fad90 [1.692189] x21: 000000000000000a x20: ffff0000c0048500 [1.697496] x19: ffff0000c0048500 x18: ffffffffffffffff [1.702804] x17: 0000000000000000 x16: 0000000000000000 [1.708112] x15: ffff800011460300 x14: fffffffffffe0000 [1.713420] x13: ffff8000114602d8 x12: 0720072007200720 [1.718727] x11: 0720072007200720 x10: 0720072007200720 [1.724035] x9 : ffff800011b9bbe0 x8 : ffff800011b9bbe0 [1.729342] x7 : 0000000000000009 x6 : ffff8000114b8328 [1.734649] x5 : 0000000000000000 x4 : 0000000000000000 [1.739956] x3 : 00000000ffffffff x2 : ffff800011460298 [1.745263] x1 : 1af1d7de276f4500 x0 : 0000000000000000 [1.750572] Call trace: [1.753010] clk_core_disable+0xb0/0xb8 [1.756840] clk_core_disable_lock+0x24/0x40 [1.761105] clk_disable+0x20/0x30 [1.764501] mtk_iommu_runtime_suspend+0x88/0xa8 [1.769114] pm_generic_runtime_suspend+0x2c/0x48 [1.773815] __rpm_callback+0xe0/0x178 [1.777559] rpm_callback+0x24/0x88 [1.781041] rpm_suspend+0xdc/0x470 [1.784523] rpm_idle+0x12c/0x170 [1.787831] pm_runtime_work+0xa8/0xc0 [1.791573] process_one_work+0x1e8/0x360 [1.795580] worker_thread+0x44/0x478 [1.799237] kthread+0x150/0x158 [1.802460] ret_from_fork+0x10/0x30 [1.806034] ---[ end trace 82402920ef64573b ]--- [1.810728] ------------[ cut here ]------------ In addition, we now don't need to enable the clock from the function mtk_iommu_hw_init since it is already enabled by the resume.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://git.kernel.org/stable/c/5cad9e2caa9613fdcd246bd4ebf0ffbec1cba2ca
https://git.kernel.org/stable/c/b34ea31fe013569d42b7e8681ef3f717f77c5b72
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 debian_10 linux * Up to (excluding) 4.19.304-1
运行在以下环境
系统 debian_11 linux * Up to (excluding) 5.10.209-2
运行在以下环境
系统 debian_12 linux * Up to (excluding) 6.1.76-1
CVSS3评分 N/A
  • 攻击路径 N/A
  • 攻击复杂度 N/A
  • 权限要求 N/A
  • 影响范围 N/A
  • 用户交互 N/A
  • 可用性 N/A
  • 保密性 N/A
  • 完整性 N/A
N/A
CWE-ID 漏洞类型
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0