CVE-2021-46953

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/02/2024
Last modified:
10/04/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ACPI: GTDT: Don&amp;#39;t corrupt interrupt mappings on watchdow probe failure<br /> <br /> When failing the driver probe because of invalid firmware properties,<br /> the GTDT driver unmaps the interrupt that it mapped earlier.<br /> <br /> However, it never checks whether the mapping of the interrupt actially<br /> succeeded. Even more, should the firmware report an illegal interrupt<br /> number that overlaps with the GIC SGI range, this can result in an<br /> IPI being unmapped, and subsequent fireworks (as reported by Dann<br /> Frazier).<br /> <br /> Rework the driver to have a slightly saner behaviour and actually<br /> check whether the interrupt has been mapped before unmapping things.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.12.0 (including) 4.14.233 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.15.0 (including) 4.19.191 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20.0 (including) 5.4.118 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5.0 (including) 5.10.36 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11.0 (including) 5.11.20 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.12.0 (including) 5.12.3 (excluding)