CVE-2021-46953
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/02/2024
Last modified:
10/04/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ACPI: GTDT: Don&#39;t corrupt interrupt mappings on watchdow probe failure<br />
<br />
When failing the driver probe because of invalid firmware properties,<br />
the GTDT driver unmaps the interrupt that it mapped earlier.<br />
<br />
However, it never checks whether the mapping of the interrupt actially<br />
succeeded. Even more, should the firmware report an illegal interrupt<br />
number that overlaps with the GIC SGI range, this can result in an<br />
IPI being unmapped, and subsequent fireworks (as reported by Dann<br />
Frazier).<br />
<br />
Rework the driver to have a slightly saner behaviour and actually<br />
check whether the interrupt has been mapped before unmapping things.
Impact
Base Score 3.x
6.70
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.12.0 (including) | 4.14.233 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15.0 (including) | 4.19.191 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20.0 (including) | 5.4.118 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5.0 (including) | 5.10.36 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11.0 (including) | 5.11.20 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.12.0 (including) | 5.12.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1ecd5b129252249b9bc03d7645a7bda512747277
- https://git.kernel.org/stable/c/42e69521ee1fa5abf21f478d147d06bbfe6bf6a8
- https://git.kernel.org/stable/c/504632a3577a049dd9bb7aabae5b4476f9c586b4
- https://git.kernel.org/stable/c/596e079c362ac17ed02aa1b99fdc444d62072a01
- https://git.kernel.org/stable/c/7b2162db1498c71962a4bb2f776fa4e76d4d305b
- https://git.kernel.org/stable/c/c3385a9122f8db15b453e07bfc88117fce7f3724
- https://git.kernel.org/stable/c/e0f2d86481eaa83df33b0793f75212919db7a19d



