CVE-2021-46953

In the Linux kernel, the following vulnerability has been resolved: ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure When failing the driver probe because of invalid firmware properties, the GTDT driver unmaps the interrupt that it mapped earlier. However, it never checks whether the mapping of the interrupt actially succeeded. Even more, should the firmware report an illegal interrupt number that overlaps with the GIC SGI range, this can result in an IPI being unmapped, and subsequent fireworks (as reported by Dann Frazier). Rework the driver to have a slightly saner behaviour and actually check whether the interrupt has been mapped before unmapping things.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

10 Apr 2024, 20:15

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.7
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/1ecd5b129252249b9bc03d7645a7bda512747277 - () https://git.kernel.org/stable/c/1ecd5b129252249b9bc03d7645a7bda512747277 - Patch
References () https://git.kernel.org/stable/c/42e69521ee1fa5abf21f478d147d06bbfe6bf6a8 - () https://git.kernel.org/stable/c/42e69521ee1fa5abf21f478d147d06bbfe6bf6a8 - Patch
References () https://git.kernel.org/stable/c/504632a3577a049dd9bb7aabae5b4476f9c586b4 - () https://git.kernel.org/stable/c/504632a3577a049dd9bb7aabae5b4476f9c586b4 - Patch
References () https://git.kernel.org/stable/c/596e079c362ac17ed02aa1b99fdc444d62072a01 - () https://git.kernel.org/stable/c/596e079c362ac17ed02aa1b99fdc444d62072a01 - Patch
References () https://git.kernel.org/stable/c/7b2162db1498c71962a4bb2f776fa4e76d4d305b - () https://git.kernel.org/stable/c/7b2162db1498c71962a4bb2f776fa4e76d4d305b - Patch
References () https://git.kernel.org/stable/c/c3385a9122f8db15b453e07bfc88117fce7f3724 - () https://git.kernel.org/stable/c/c3385a9122f8db15b453e07bfc88117fce7f3724 - Patch
References () https://git.kernel.org/stable/c/e0f2d86481eaa83df33b0793f75212919db7a19d - () https://git.kernel.org/stable/c/e0f2d86481eaa83df33b0793f75212919db7a19d - Patch
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: ACPI: GTDT: no corrompe las asignaciones de interrupciones en caso de falla de la sonda de vigilancia. Cuando falla la sonda del controlador debido a propiedades de firmware no válidas, el controlador GTDT desasigna la interrupción que asignó anteriormente. Sin embargo, nunca comprueba si el mapeo de la interrupción realmente tuvo éxito. Aún más, si el firmware informa un número de interrupción ilegal que se superpone con el rango GIC SGI, esto puede resultar en que un IPI no se asigne y en posteriores fuegos artificiales (según lo informado por Dann Frazier). Vuelva a trabajar el controlador para que tenga un comportamiento un poco más sensato y verifique si la interrupción se ha asignado antes de desasignar las cosas.

27 Feb 2024, 19:04

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-27 19:04

Updated : 2024-04-10 20:15


NVD link : CVE-2021-46953

Mitre link : CVE-2021-46953

CVE.ORG link : CVE-2021-46953


JSON object : View

Products Affected

linux

  • linux_kernel