CVE-2021-46953 (GCVE-0-2021-46953)
Vulnerability from cvelistv5
Published
2024-02-27 18:40
Modified
2025-05-04 07:01
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure When failing the driver probe because of invalid firmware properties, the GTDT driver unmaps the interrupt that it mapped earlier. However, it never checks whether the mapping of the interrupt actially succeeded. Even more, should the firmware report an illegal interrupt number that overlaps with the GIC SGI range, this can result in an IPI being unmapped, and subsequent fireworks (as reported by Dann Frazier). Rework the driver to have a slightly saner behaviour and actually check whether the interrupt has been mapped before unmapping things.
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/1ecd5b129252249b9bc03d7645a7bda512747277 Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/42e69521ee1fa5abf21f478d147d06bbfe6bf6a8 Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/504632a3577a049dd9bb7aabae5b4476f9c586b4 Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/596e079c362ac17ed02aa1b99fdc444d62072a01 Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/7b2162db1498c71962a4bb2f776fa4e76d4d305b Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/c3385a9122f8db15b453e07bfc88117fce7f3724 Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/e0f2d86481eaa83df33b0793f75212919db7a19d Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/1ecd5b129252249b9bc03d7645a7bda512747277 Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/42e69521ee1fa5abf21f478d147d06bbfe6bf6a8 Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/504632a3577a049dd9bb7aabae5b4476f9c586b4 Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/596e079c362ac17ed02aa1b99fdc444d62072a01 Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/7b2162db1498c71962a4bb2f776fa4e76d4d305b Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/c3385a9122f8db15b453e07bfc88117fce7f3724 Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/e0f2d86481eaa83df33b0793f75212919db7a19d Patch
Impacted products
Vendor Product Version
Linux Linux Version: ca9ae5ec4ef0ed13833b03297ab319676965492c
Version: ca9ae5ec4ef0ed13833b03297ab319676965492c
Version: ca9ae5ec4ef0ed13833b03297ab319676965492c
Version: ca9ae5ec4ef0ed13833b03297ab319676965492c
Version: ca9ae5ec4ef0ed13833b03297ab319676965492c
Version: ca9ae5ec4ef0ed13833b03297ab319676965492c
Version: ca9ae5ec4ef0ed13833b03297ab319676965492c
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:17:43.012Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/c3385a9122f8db15b453e07bfc88117fce7f3724"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/7b2162db1498c71962a4bb2f776fa4e76d4d305b"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/504632a3577a049dd9bb7aabae5b4476f9c586b4"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/e0f2d86481eaa83df33b0793f75212919db7a19d"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/42e69521ee1fa5abf21f478d147d06bbfe6bf6a8"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/596e079c362ac17ed02aa1b99fdc444d62072a01"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/1ecd5b129252249b9bc03d7645a7bda512747277"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-46953",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T16:01:41.363644Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:33:49.626Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/acpi/arm64/gtdt.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "c3385a9122f8db15b453e07bfc88117fce7f3724",
              "status": "affected",
              "version": "ca9ae5ec4ef0ed13833b03297ab319676965492c",
              "versionType": "git"
            },
            {
              "lessThan": "7b2162db1498c71962a4bb2f776fa4e76d4d305b",
              "status": "affected",
              "version": "ca9ae5ec4ef0ed13833b03297ab319676965492c",
              "versionType": "git"
            },
            {
              "lessThan": "504632a3577a049dd9bb7aabae5b4476f9c586b4",
              "status": "affected",
              "version": "ca9ae5ec4ef0ed13833b03297ab319676965492c",
              "versionType": "git"
            },
            {
              "lessThan": "e0f2d86481eaa83df33b0793f75212919db7a19d",
              "status": "affected",
              "version": "ca9ae5ec4ef0ed13833b03297ab319676965492c",
              "versionType": "git"
            },
            {
              "lessThan": "42e69521ee1fa5abf21f478d147d06bbfe6bf6a8",
              "status": "affected",
              "version": "ca9ae5ec4ef0ed13833b03297ab319676965492c",
              "versionType": "git"
            },
            {
              "lessThan": "596e079c362ac17ed02aa1b99fdc444d62072a01",
              "status": "affected",
              "version": "ca9ae5ec4ef0ed13833b03297ab319676965492c",
              "versionType": "git"
            },
            {
              "lessThan": "1ecd5b129252249b9bc03d7645a7bda512747277",
              "status": "affected",
              "version": "ca9ae5ec4ef0ed13833b03297ab319676965492c",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/acpi/arm64/gtdt.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "4.12"
            },
            {
              "lessThan": "4.12",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.233",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.191",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.118",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.36",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.11.*",
              "status": "unaffected",
              "version": "5.11.20",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.12.*",
              "status": "unaffected",
              "version": "5.12.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.13",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.233",
                  "versionStartIncluding": "4.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.191",
                  "versionStartIncluding": "4.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.118",
                  "versionStartIncluding": "4.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.36",
                  "versionStartIncluding": "4.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.11.20",
                  "versionStartIncluding": "4.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.12.3",
                  "versionStartIncluding": "4.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.13",
                  "versionStartIncluding": "4.12",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: GTDT: Don\u0027t corrupt interrupt mappings on watchdow probe failure\n\nWhen failing the driver probe because of invalid firmware properties,\nthe GTDT driver unmaps the interrupt that it mapped earlier.\n\nHowever, it never checks whether the mapping of the interrupt actially\nsucceeded. Even more, should the firmware report an illegal interrupt\nnumber that overlaps with the GIC SGI range, this can result in an\nIPI being unmapped, and subsequent fireworks (as reported by Dann\nFrazier).\n\nRework the driver to have a slightly saner behaviour and actually\ncheck whether the interrupt has been mapped before unmapping things."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T07:01:05.182Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/c3385a9122f8db15b453e07bfc88117fce7f3724"
        },
        {
          "url": "https://git.kernel.org/stable/c/7b2162db1498c71962a4bb2f776fa4e76d4d305b"
        },
        {
          "url": "https://git.kernel.org/stable/c/504632a3577a049dd9bb7aabae5b4476f9c586b4"
        },
        {
          "url": "https://git.kernel.org/stable/c/e0f2d86481eaa83df33b0793f75212919db7a19d"
        },
        {
          "url": "https://git.kernel.org/stable/c/42e69521ee1fa5abf21f478d147d06bbfe6bf6a8"
        },
        {
          "url": "https://git.kernel.org/stable/c/596e079c362ac17ed02aa1b99fdc444d62072a01"
        },
        {
          "url": "https://git.kernel.org/stable/c/1ecd5b129252249b9bc03d7645a7bda512747277"
        }
      ],
      "title": "ACPI: GTDT: Don\u0027t corrupt interrupt mappings on watchdow probe failure",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2021-46953",
    "datePublished": "2024-02-27T18:40:35.960Z",
    "dateReserved": "2024-02-25T13:45:52.722Z",
    "dateUpdated": "2025-05-04T07:01:05.182Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-46953\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-02-27T19:04:06.567\",\"lastModified\":\"2024-11-21T06:35:01.110\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nACPI: GTDT: Don\u0027t corrupt interrupt mappings on watchdow probe failure\\n\\nWhen failing the driver probe because of invalid firmware properties,\\nthe GTDT driver unmaps the interrupt that it mapped earlier.\\n\\nHowever, it never checks whether the mapping of the interrupt actially\\nsucceeded. Even more, should the firmware report an illegal interrupt\\nnumber that overlaps with the GIC SGI range, this can result in an\\nIPI being unmapped, and subsequent fireworks (as reported by Dann\\nFrazier).\\n\\nRework the driver to have a slightly saner behaviour and actually\\ncheck whether the interrupt has been mapped before unmapping things.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ACPI: GTDT: no corrompe las asignaciones de interrupciones en caso de falla de la sonda de vigilancia. Cuando falla la sonda del controlador debido a propiedades de firmware no v\u00e1lidas, el controlador GTDT desasigna la interrupci\u00f3n que asign\u00f3 anteriormente. Sin embargo, nunca comprueba si el mapeo de la interrupci\u00f3n realmente tuvo \u00e9xito. A\u00fan m\u00e1s, si el firmware informa un n\u00famero de interrupci\u00f3n ilegal que se superpone con el rango GIC SGI, esto puede resultar en que un IPI no se asigne y en posteriores fuegos artificiales (seg\u00fan lo informado por Dann Frazier). Vuelva a trabajar el controlador para que tenga un comportamiento un poco m\u00e1s sensato y verifique si la interrupci\u00f3n se ha asignado antes de desasignar las cosas.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.12.0\",\"versionEndExcluding\":\"4.14.233\",\"matchCriteriaId\":\"C5472130-46E6-49C5-818B-7251D6EF4E25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15.0\",\"versionEndExcluding\":\"4.19.191\",\"matchCriteriaId\":\"B7281E1E-A00B-49C0-A849-9CE1CE780227\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20.0\",\"versionEndExcluding\":\"5.4.118\",\"matchCriteriaId\":\"5670AEA3-082C-42D6-A067-CD9ECED4B84B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5.0\",\"versionEndExcluding\":\"5.10.36\",\"matchCriteriaId\":\"C7148769-B830-4B8F-986F-E0C85A19FC7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11.0\",\"versionEndExcluding\":\"5.11.20\",\"matchCriteriaId\":\"EFB425F0-C28C-4B44-8B4C-AD512AA832DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.12.0\",\"versionEndExcluding\":\"5.12.3\",\"matchCriteriaId\":\"C3814FA3-8141-4313-A852-8C4212BE12AD\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1ecd5b129252249b9bc03d7645a7bda512747277\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/42e69521ee1fa5abf21f478d147d06bbfe6bf6a8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/504632a3577a049dd9bb7aabae5b4476f9c586b4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/596e079c362ac17ed02aa1b99fdc444d62072a01\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/7b2162db1498c71962a4bb2f776fa4e76d4d305b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/c3385a9122f8db15b453e07bfc88117fce7f3724\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e0f2d86481eaa83df33b0793f75212919db7a19d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/1ecd5b129252249b9bc03d7645a7bda512747277\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/42e69521ee1fa5abf21f478d147d06bbfe6bf6a8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/504632a3577a049dd9bb7aabae5b4476f9c586b4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/596e079c362ac17ed02aa1b99fdc444d62072a01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/7b2162db1498c71962a4bb2f776fa4e76d4d305b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/c3385a9122f8db15b453e07bfc88117fce7f3724\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e0f2d86481eaa83df33b0793f75212919db7a19d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/c3385a9122f8db15b453e07bfc88117fce7f3724\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/7b2162db1498c71962a4bb2f776fa4e76d4d305b\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/504632a3577a049dd9bb7aabae5b4476f9c586b4\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/e0f2d86481eaa83df33b0793f75212919db7a19d\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/42e69521ee1fa5abf21f478d147d06bbfe6bf6a8\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/596e079c362ac17ed02aa1b99fdc444d62072a01\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/1ecd5b129252249b9bc03d7645a7bda512747277\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T05:17:43.012Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-46953\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T16:01:41.363644Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:18.981Z\"}}], \"cna\": {\"title\": \"ACPI: GTDT: Don\u0027t corrupt interrupt mappings on watchdow probe failure\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"ca9ae5ec4ef0ed13833b03297ab319676965492c\", \"lessThan\": \"c3385a9122f8db15b453e07bfc88117fce7f3724\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ca9ae5ec4ef0ed13833b03297ab319676965492c\", \"lessThan\": \"7b2162db1498c71962a4bb2f776fa4e76d4d305b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ca9ae5ec4ef0ed13833b03297ab319676965492c\", \"lessThan\": \"504632a3577a049dd9bb7aabae5b4476f9c586b4\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ca9ae5ec4ef0ed13833b03297ab319676965492c\", \"lessThan\": \"e0f2d86481eaa83df33b0793f75212919db7a19d\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ca9ae5ec4ef0ed13833b03297ab319676965492c\", \"lessThan\": \"42e69521ee1fa5abf21f478d147d06bbfe6bf6a8\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ca9ae5ec4ef0ed13833b03297ab319676965492c\", \"lessThan\": \"596e079c362ac17ed02aa1b99fdc444d62072a01\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ca9ae5ec4ef0ed13833b03297ab319676965492c\", \"lessThan\": \"1ecd5b129252249b9bc03d7645a7bda512747277\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/acpi/arm64/gtdt.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.12\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"4.12\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.14.233\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.14.*\"}, {\"status\": \"unaffected\", \"version\": \"4.19.191\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.118\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.36\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.11.20\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.11.*\"}, {\"status\": \"unaffected\", \"version\": \"5.12.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.12.*\"}, {\"status\": \"unaffected\", \"version\": \"5.13\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/acpi/arm64/gtdt.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/c3385a9122f8db15b453e07bfc88117fce7f3724\"}, {\"url\": \"https://git.kernel.org/stable/c/7b2162db1498c71962a4bb2f776fa4e76d4d305b\"}, {\"url\": \"https://git.kernel.org/stable/c/504632a3577a049dd9bb7aabae5b4476f9c586b4\"}, {\"url\": \"https://git.kernel.org/stable/c/e0f2d86481eaa83df33b0793f75212919db7a19d\"}, {\"url\": \"https://git.kernel.org/stable/c/42e69521ee1fa5abf21f478d147d06bbfe6bf6a8\"}, {\"url\": \"https://git.kernel.org/stable/c/596e079c362ac17ed02aa1b99fdc444d62072a01\"}, {\"url\": \"https://git.kernel.org/stable/c/1ecd5b129252249b9bc03d7645a7bda512747277\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nACPI: GTDT: Don\u0027t corrupt interrupt mappings on watchdow probe failure\\n\\nWhen failing the driver probe because of invalid firmware properties,\\nthe GTDT driver unmaps the interrupt that it mapped earlier.\\n\\nHowever, it never checks whether the mapping of the interrupt actially\\nsucceeded. Even more, should the firmware report an illegal interrupt\\nnumber that overlaps with the GIC SGI range, this can result in an\\nIPI being unmapped, and subsequent fireworks (as reported by Dann\\nFrazier).\\n\\nRework the driver to have a slightly saner behaviour and actually\\ncheck whether the interrupt has been mapped before unmapping things.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.14.233\", \"versionStartIncluding\": \"4.12\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.191\", \"versionStartIncluding\": \"4.12\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.118\", \"versionStartIncluding\": \"4.12\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.36\", \"versionStartIncluding\": \"4.12\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.11.20\", \"versionStartIncluding\": \"4.12\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.12.3\", \"versionStartIncluding\": \"4.12\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.13\", \"versionStartIncluding\": \"4.12\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T07:01:05.182Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2021-46953\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T07:01:05.182Z\", \"dateReserved\": \"2024-02-25T13:45:52.722Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-02-27T18:40:35.960Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…