CVE-2021-46990
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
28/02/2024
Last modified:
26/12/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
powerpc/64s: Fix crashes when toggling entry flush barrier<br />
<br />
The entry flush mitigation can be enabled/disabled at runtime via a<br />
debugfs file (entry_flush), which causes the kernel to patch itself to<br />
enable/disable the relevant mitigations.<br />
<br />
However depending on which mitigation we&#39;re using, it may not be safe to<br />
do that patching while other CPUs are active. For example the following<br />
crash:<br />
<br />
sleeper[15639]: segfault (11) at c000000000004c20 nip c000000000004c20 lr c000000000004c20<br />
<br />
Shows that we returned to userspace with a corrupted LR that points into<br />
the kernel, due to executing the partially patched call to the fallback<br />
entry flush (ie. we missed the LR restore).<br />
<br />
Fix it by doing the patching under stop machine. The CPUs that aren&#39;t<br />
doing the patching will be spinning in the core of the stop machine<br />
logic. That is currently sufficient for our purposes, because none of<br />
the patching we do is to that code or anywhere in the vicinity.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.4.245 (including) | 4.4.269 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.9.245 (including) | 4.9.269 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.14.208 (including) | 4.14.233 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19.159 (including) | 4.19.191 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4.79 (including) | 5.4.120 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10 (including) | 5.10.38 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.11.22 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.12 (including) | 5.12.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0b4eb172cc12dc102cd0ad013e53ee4463db9508
- https://git.kernel.org/stable/c/0c25a7bb697f2e6ee65b6d63782f675bf129511a
- https://git.kernel.org/stable/c/2db22ba4e0e103f00e0512e0ecce36ac78c644f8
- https://git.kernel.org/stable/c/5bc00fdda1e934c557351a9c751a205293e68cbf
- https://git.kernel.org/stable/c/8382b15864e5014261b4f36c2aa89723612ee058
- https://git.kernel.org/stable/c/aec86b052df6541cc97c5fca44e5934cbea4963b
- https://git.kernel.org/stable/c/d2e3590ca39ccfd8a5a46d8c7f095cb6c7b9ae92
- https://git.kernel.org/stable/c/dd0d6117052faace5440db20fc37175efe921c7d
- https://git.kernel.org/stable/c/ee4b7aab93c2631c3bb0753023c5dda592bb666b
- https://git.kernel.org/stable/c/0b4eb172cc12dc102cd0ad013e53ee4463db9508
- https://git.kernel.org/stable/c/0c25a7bb697f2e6ee65b6d63782f675bf129511a
- https://git.kernel.org/stable/c/2db22ba4e0e103f00e0512e0ecce36ac78c644f8
- https://git.kernel.org/stable/c/5bc00fdda1e934c557351a9c751a205293e68cbf
- https://git.kernel.org/stable/c/8382b15864e5014261b4f36c2aa89723612ee058
- https://git.kernel.org/stable/c/aec86b052df6541cc97c5fca44e5934cbea4963b
- https://git.kernel.org/stable/c/d2e3590ca39ccfd8a5a46d8c7f095cb6c7b9ae92
- https://git.kernel.org/stable/c/dd0d6117052faace5440db20fc37175efe921c7d
- https://git.kernel.org/stable/c/ee4b7aab93c2631c3bb0753023c5dda592bb666b



