CVE-2021-47317
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/05/2024
Last modified:
12/05/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
powerpc/bpf: Fix detecting BPF atomic instructions<br />
<br />
Commit 91c960b0056672 ("bpf: Rename BPF_XADD and prepare to encode other<br />
atomics in .imm") converted BPF_XADD to BPF_ATOMIC and added a way to<br />
distinguish instructions based on the immediate field. Existing JIT<br />
implementations were updated to check for the immediate field and to<br />
reject programs utilizing anything more than BPF_ADD (such as BPF_FETCH)<br />
in the immediate field.<br />
<br />
However, the check added to powerpc64 JIT did not look at the correct<br />
BPF instruction. Due to this, such programs would be accepted and<br />
incorrectly JIT&#39;ed resulting in soft lockups, as seen with the atomic<br />
bounds test. Fix this by looking at the correct immediate value.
Impact
Base Score 3.x
3.30
Severity 3.x
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.12 (including) | 5.12.19 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.13 (including) | 5.13.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0d435b6d94b05dcfd836d758a63145aa566618e2
- https://git.kernel.org/stable/c/419ac821766cbdb9fd85872bb3f1a589df05c94c
- https://git.kernel.org/stable/c/7284dab07e4d51d453cc42851fae9ec4fac6ef2f
- https://git.kernel.org/stable/c/0d435b6d94b05dcfd836d758a63145aa566618e2
- https://git.kernel.org/stable/c/419ac821766cbdb9fd85872bb3f1a589df05c94c
- https://git.kernel.org/stable/c/7284dab07e4d51d453cc42851fae9ec4fac6ef2f



