CVE-2021-47098: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations Commit b50aa49638c7 ("hwmon: (lm90) Prevent integer underflows of temperature calculations") addressed a number of underflow situations when writing temperature limits. However, it missed one situation, seen when an attempt is made to set the hysteresis value to MAX_LONG and the critical temperature limit is negative. Use clamp_val() when setting the hysteresis temperature to ensure that the provided value can never overflow or underflow.
AI Analysis
Technical Summary
CVE-2021-47098 is a vulnerability identified in the Linux kernel's hardware monitoring (hwmon) subsystem, specifically within the lm90 driver responsible for temperature sensor management. The issue pertains to integer overflow and underflow conditions during hysteresis temperature calculations. Previously, a commit (b50aa49638c7) addressed several underflow scenarios when writing temperature limits, but it failed to cover a particular edge case. This case occurs when the hysteresis value is set to the maximum long integer value (MAX_LONG) while the critical temperature limit is negative. Without proper clamping, this can cause integer overflow or underflow, potentially leading to incorrect temperature readings or limit settings. The vulnerability is mitigated by using the clamp_val() function to ensure the hysteresis temperature value remains within safe bounds, preventing overflow or underflow. Although this vulnerability affects the Linux kernel, it is limited to the hwmon lm90 driver code path and involves internal temperature limit calculations rather than direct user-facing interfaces. No known exploits are reported in the wild, and the vulnerability was published in March 2024. The affected versions correspond to the commit before the patch was applied. The vulnerability does not have an assigned CVSS score, and no evidence suggests it requires user interaction or authentication for exploitation. The impact is primarily on the integrity and reliability of temperature monitoring within affected Linux systems, which could potentially affect system stability or hardware protection mechanisms if exploited.
Potential Impact
For European organizations, the impact of CVE-2021-47098 is primarily related to the reliability and stability of Linux-based systems that utilize the lm90 hardware monitoring driver. These systems are often embedded in servers, industrial control systems, or specialized hardware monitoring environments. Incorrect temperature readings or failure to enforce temperature limits due to integer overflow/underflow could lead to hardware overheating, premature hardware failure, or unexpected system shutdowns. This could disrupt critical infrastructure, manufacturing processes, or data center operations. However, the vulnerability does not appear to allow remote code execution or privilege escalation directly. The absence of known exploits reduces immediate risk, but organizations relying on Linux kernel versions prior to the patch should consider the potential for hardware damage or operational disruption. European sectors with high dependence on Linux-based embedded systems, such as manufacturing, energy, telecommunications, and research institutions, may be more affected. The impact is less critical for general-purpose Linux desktop or server environments unless they specifically use the affected hwmon driver and hardware sensors.
Mitigation Recommendations
European organizations should apply the Linux kernel patch that includes the commit fixing this vulnerability, ensuring the use of clamp_val() in hysteresis temperature calculations within the lm90 driver. Kernel updates should be prioritized on systems running hardware that uses the lm90 sensor driver, especially in industrial or embedded environments. Organizations should audit their Linux kernel versions and hardware monitoring configurations to identify affected systems. Additionally, monitoring system logs for temperature sensor anomalies or hardware warnings can help detect potential exploitation or misbehavior. For critical infrastructure, implementing hardware-level temperature monitoring and alerts independent of the Linux kernel can provide an additional safety layer. Vendors providing Linux-based embedded systems should be engaged to confirm patch availability and deployment timelines. Finally, maintaining a robust patch management process and verifying kernel integrity post-update will reduce exposure to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden, Finland, Poland
CVE-2021-47098: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations Commit b50aa49638c7 ("hwmon: (lm90) Prevent integer underflows of temperature calculations") addressed a number of underflow situations when writing temperature limits. However, it missed one situation, seen when an attempt is made to set the hysteresis value to MAX_LONG and the critical temperature limit is negative. Use clamp_val() when setting the hysteresis temperature to ensure that the provided value can never overflow or underflow.
AI-Powered Analysis
Technical Analysis
CVE-2021-47098 is a vulnerability identified in the Linux kernel's hardware monitoring (hwmon) subsystem, specifically within the lm90 driver responsible for temperature sensor management. The issue pertains to integer overflow and underflow conditions during hysteresis temperature calculations. Previously, a commit (b50aa49638c7) addressed several underflow scenarios when writing temperature limits, but it failed to cover a particular edge case. This case occurs when the hysteresis value is set to the maximum long integer value (MAX_LONG) while the critical temperature limit is negative. Without proper clamping, this can cause integer overflow or underflow, potentially leading to incorrect temperature readings or limit settings. The vulnerability is mitigated by using the clamp_val() function to ensure the hysteresis temperature value remains within safe bounds, preventing overflow or underflow. Although this vulnerability affects the Linux kernel, it is limited to the hwmon lm90 driver code path and involves internal temperature limit calculations rather than direct user-facing interfaces. No known exploits are reported in the wild, and the vulnerability was published in March 2024. The affected versions correspond to the commit before the patch was applied. The vulnerability does not have an assigned CVSS score, and no evidence suggests it requires user interaction or authentication for exploitation. The impact is primarily on the integrity and reliability of temperature monitoring within affected Linux systems, which could potentially affect system stability or hardware protection mechanisms if exploited.
Potential Impact
For European organizations, the impact of CVE-2021-47098 is primarily related to the reliability and stability of Linux-based systems that utilize the lm90 hardware monitoring driver. These systems are often embedded in servers, industrial control systems, or specialized hardware monitoring environments. Incorrect temperature readings or failure to enforce temperature limits due to integer overflow/underflow could lead to hardware overheating, premature hardware failure, or unexpected system shutdowns. This could disrupt critical infrastructure, manufacturing processes, or data center operations. However, the vulnerability does not appear to allow remote code execution or privilege escalation directly. The absence of known exploits reduces immediate risk, but organizations relying on Linux kernel versions prior to the patch should consider the potential for hardware damage or operational disruption. European sectors with high dependence on Linux-based embedded systems, such as manufacturing, energy, telecommunications, and research institutions, may be more affected. The impact is less critical for general-purpose Linux desktop or server environments unless they specifically use the affected hwmon driver and hardware sensors.
Mitigation Recommendations
European organizations should apply the Linux kernel patch that includes the commit fixing this vulnerability, ensuring the use of clamp_val() in hysteresis temperature calculations within the lm90 driver. Kernel updates should be prioritized on systems running hardware that uses the lm90 sensor driver, especially in industrial or embedded environments. Organizations should audit their Linux kernel versions and hardware monitoring configurations to identify affected systems. Additionally, monitoring system logs for temperature sensor anomalies or hardware warnings can help detect potential exploitation or misbehavior. For critical infrastructure, implementing hardware-level temperature monitoring and alerts independent of the Linux kernel can provide an additional safety layer. Vendors providing Linux-based embedded systems should be engaged to confirm patch availability and deployment timelines. Finally, maintaining a robust patch management process and verifying kernel integrity post-update will reduce exposure to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-29T22:33:44.301Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9834c4522896dcbe9cf6
Added to database: 5/21/2025, 9:09:08 AM
Last enriched: 6/30/2025, 9:27:34 PM
Last updated: 7/26/2025, 9:12:17 PM
Views: 10
Related Threats
CVE-2025-43734: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-36124: CWE-268 Privilege Chaining in IBM WebSphere Application Server Liberty
MediumCVE-2025-55168: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
CriticalCVE-2025-53744: Escalation of privilege in Fortinet FortiOS
MediumCVE-2025-52970: Improper access control in Fortinet FortiWeb
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.