{
  "threat_severity" : "Low",
  "public_date" : "2024-05-22T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: mlxsw: thermal: Fix out-of-bounds memory accesses",
    "id" : "2282851",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2282851"
  },
  "cvss3" : {
    "cvss3_base_score" : "4.8",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:H",
    "status" : "verified"
  },
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\nmlxsw: thermal: Fix out-of-bounds memory accesses\nCurrently, mlxsw allows cooling states to be set above the maximum\ncooling state supported by the driver:\n# cat /sys/class/thermal/thermal_zone2/cdev0/type\nmlxsw_fan\n# cat /sys/class/thermal/thermal_zone2/cdev0/max_state\n10\n# echo 18 > /sys/class/thermal/thermal_zone2/cdev0/cur_state\n# echo $?\n0\nThis results in out-of-bounds memory accesses when thermal state\ntransition statistics are enabled (CONFIG_THERMAL_STATISTICS=y), as the\ntransition table is accessed with a too large index (state) [1].\nAccording to the thermal maintainer, it is the responsibility of the\ndriver to reject such operations [2].\nTherefore, return an error when the state to be set exceeds the maximum\ncooling state supported by the driver.\nTo avoid dead code, as suggested by the thermal maintainer [3],\npartially revert commit a421ce088ac8 (\"mlxsw: core: Extend cooling\ndevice with cooling levels\") that tried to interpret these invalid\ncooling states (above the maximum) in a special way. The cooling levels\narray is not removed in order to prevent the fans going below 20% PWM,\nwhich would cause them to get stuck at 0% PWM.\n[1]\nBUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x271/0x290\nRead of size 4 at addr ffff8881052f7bf8 by task kworker/0:0/5\nCPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.15.0-rc3-custom-45935-gce1adf704b14 #122\nHardware name: Mellanox Technologies Ltd. \"MSN2410-CB2FO\"/\"SA000874\", BIOS 4.6.5 03/08/2016\nWorkqueue: events_freezable_power_ thermal_zone_device_check\nCall Trace:\ndump_stack_lvl+0x8b/0xb3\nprint_address_description.constprop.0+0x1f/0x140\nkasan_report.cold+0x7f/0x11b\nthermal_cooling_device_stats_update+0x271/0x290\n__thermal_cdev_update+0x15e/0x4e0\nthermal_cdev_update+0x9f/0xe0\nstep_wise_throttle+0x770/0xee0\nthermal_zone_device_update+0x3f6/0xdf0\nprocess_one_work+0xa42/0x1770\nworker_thread+0x62f/0x13e0\nkthread+0x3ee/0x4e0\nret_from_fork+0x1f/0x30\nAllocated by task 1:\nkasan_save_stack+0x1b/0x40\n__kasan_kmalloc+0x7c/0x90\nthermal_cooling_device_setup_sysfs+0x153/0x2c0\n__thermal_cooling_device_register.part.0+0x25b/0x9c0\nthermal_cooling_device_register+0xb3/0x100\nmlxsw_thermal_init+0x5c5/0x7e0\n__mlxsw_core_bus_device_register+0xcb3/0x19c0\nmlxsw_core_bus_device_register+0x56/0xb0\nmlxsw_pci_probe+0x54f/0x710\nlocal_pci_probe+0xc6/0x170\npci_device_probe+0x2b2/0x4d0\nreally_probe+0x293/0xd10\n__driver_probe_device+0x2af/0x440\ndriver_probe_device+0x51/0x1e0\n__driver_attach+0x21b/0x530\nbus_for_each_dev+0x14c/0x1d0\nbus_add_driver+0x3ac/0x650\ndriver_register+0x241/0x3d0\nmlxsw_sp_module_init+0xa2/0x174\ndo_one_initcall+0xee/0x5f0\nkernel_init_freeable+0x45a/0x4de\nkernel_init+0x1f/0x210\nret_from_fork+0x1f/0x30\nThe buggy address belongs to the object at ffff8881052f7800\nwhich belongs to the cache kmalloc-1k of size 1024\nThe buggy address is located 1016 bytes inside of\n1024-byte region [ffff8881052f7800, ffff8881052f7c00)\nThe buggy address belongs to the page:\npage:0000000052355272 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1052f0\nhead:0000000052355272 order:3 compound_mapcount:0 compound_pincount:0\nflags: 0x200000000010200(slab|head|node=0|zone=2)\nraw: 0200000000010200 ffffea0005034800 0000000300000003 ffff888100041dc0\nraw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\nMemory state around the buggy address:\nffff8881052f7a80: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc\nffff8881052f7b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n>ffff8881052f7b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n^\nffff8881052f7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\nffff8881052f7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[2] https://lore.kernel.org/linux-pm/9aca37cb-1629-5c67-\n---truncated---" ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2024-09-24T00:00:00Z",
    "advisory" : "RHSA-2024:7001",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8::nfv",
    "package" : "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2024-09-24T00:00:00Z",
    "advisory" : "RHSA-2024:7000",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "kernel-0:4.18.0-553.22.1.el8_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-05-09T00:00:00Z",
    "advisory" : "RHSA-2023:2458",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-284.11.1.el9_2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-05-09T00:00:00Z",
    "advisory" : "RHSA-2023:2458",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-284.11.1.el9_2"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2021-47441\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47441" ],
  "name" : "CVE-2021-47441",
  "csaw" : false
}