{"id":"CVE-2021-47368","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nenetc: Fix illegal access when reading affinity_hint\n\nirq_set_affinity_hit() stores a reference to the cpumask_t\nparameter in the irq descriptor, and that reference can be\naccessed later from irq_affinity_hint_proc_show(). Since\nthe cpu_mask parameter passed to irq_set_affinity_hit() has\nonly temporary storage (it's on the stack memory), later\naccesses to it are illegal. Thus reads from the corresponding\nprocfs affinity_hint file can result in paging request oops.\n\nThe issue is fixed by the get_cpu_mask() helper, which provides\na permanent storage for the cpumask_t parameter.","modified":"2026-03-15T22:43:11.806188Z","published":"2024-05-21T15:15:22.773Z","related":["SUSE-SU-2024:2008-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2189-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2362-1","SUSE-SU-2024:2365-1","SUSE-SU-2024:2384-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/6c3f1b741c6c2914ea120e3a5790d3e900152f7b"},{"type":"FIX","url":"https://git.kernel.org/stable/c/6f329d9da2a5ae032fcde800a99b118124ed5270"},{"type":"FIX","url":"https://git.kernel.org/stable/c/7237a494decfa17d0b9d0076e6cee3235719de90"},{"type":"FIX","url":"https://git.kernel.org/stable/c/4c4c3052911b577920353a7646e4883d5da40c28"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"5.1"},{"fixed":"5.4.150"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.70"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.14.9"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47368.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}]}