In the Linux kernel, the following vulnerability has been resolved:
ARM: 9064/1: hwbreakpoint: Do not directly check the event's overflowhandler hook
The commit 1879445dfa7b ("perf/core: Set event's default ::overflowhandler()") set a default event->overflowhandler in perfeventalloc(), and replace the check event->overflowhandler with isdefaultoverflowhandler(), but one is missing.
Currently, the bp->overflowhandler can not be NULL. As a result, enablesingle_step() is always not invoked.
Comments from Zhen Lei:
https://patchwork.kernel.org/project/linux-arm-kernel/patch/20210207105934.2001-1-thunder.leizhen@huawei.com/
[
{
"events": [
{
"introduced": "4.7"
},
{
"fixed": "4.9.269"
}
]
},
{
"events": [
{
"introduced": "4.10"
},
{
"fixed": "4.14.233"
}
]
},
{
"events": [
{
"introduced": "4.15"
},
{
"fixed": "4.19.191"
}
]
},
{
"events": [
{
"introduced": "4.20"
},
{
"fixed": "5.4.120"
}
]
},
{
"events": [
{
"introduced": "5.5"
},
{
"fixed": "5.10.38"
}
]
},
{
"events": [
{
"introduced": "5.11"
},
{
"fixed": "5.11.22"
}
]
},
{
"events": [
{
"introduced": "5.12"
},
{
"fixed": "5.12.5"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-47006.json"