CVE-2021-47430
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/05/2024
Last modified:
25/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
x86/entry: Clear X86_FEATURE_SMAP when CONFIG_X86_SMAP=n<br />
<br />
Commit<br />
<br />
3c73b81a9164 ("x86/entry, selftests: Further improve user entry sanity checks")<br />
<br />
added a warning if AC is set when in the kernel.<br />
<br />
Commit<br />
<br />
662a0221893a3d ("x86/entry: Fix AC assertion")<br />
<br />
changed the warning to only fire if the CPU supports SMAP.<br />
<br />
However, the warning can still trigger on a machine that supports SMAP<br />
but where it&#39;s disabled in the kernel config and when running the<br />
syscall_nt selftest, for example:<br />
<br />
------------[ cut here ]------------<br />
WARNING: CPU: 0 PID: 49 at irqentry_enter_from_user_mode<br />
CPU: 0 PID: 49 Comm: init Tainted: G T 5.15.0-rc4+ #98 e6202628ee053b4f310759978284bd8bb0ce6905<br />
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014<br />
RIP: 0010:irqentry_enter_from_user_mode<br />
...<br />
Call Trace:<br />
? irqentry_enter<br />
? exc_general_protection<br />
? asm_exc_general_protection<br />
? asm_exc_general_protectio<br />
<br />
IS_ENABLED(CONFIG_X86_SMAP) could be added to the warning condition, but<br />
even this would not be enough in case SMAP is disabled at boot time with<br />
the "nosmap" parameter.<br />
<br />
To be consistent with "nosmap" behaviour, clear X86_FEATURE_SMAP when<br />
!CONFIG_X86_SMAP.<br />
<br />
Found using entry-fuzz + satrandconfig.<br />
<br />
[ bp: Massage commit message. ]
Impact
Base Score 3.x
3.30
Severity 3.x
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.8.1 (including) | 5.10.73 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.14.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.8:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.8:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.8:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.8:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.8:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/3958b9c34c2729597e182cc606cc43942fd19f7c
- https://git.kernel.org/stable/c/4e9ec1c65da98c293f75d83755dfa5e03075a6d0
- https://git.kernel.org/stable/c/f2447f6587b8ffe42ba04d14ce67d429a1163e5e
- https://git.kernel.org/stable/c/3958b9c34c2729597e182cc606cc43942fd19f7c
- https://git.kernel.org/stable/c/4e9ec1c65da98c293f75d83755dfa5e03075a6d0
- https://git.kernel.org/stable/c/f2447f6587b8ffe42ba04d14ce67d429a1163e5e



