CVE-2021-47567

In the Linux kernel, the following vulnerability has been resolved: powerpc/32: Fix hardlockup on vmap stack overflow Since the commit c118c7303ad5 ("powerpc/32: Fix vmap stack - Do not activate MMU before reading task struct") a vmap stack overflow results in a hard lockup. This is because emergency_ctx is still addressed with its virtual address allthough data MMU is not active anymore at that time. Fix it by using a physical address instead.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*

History

18 Sep 2025, 15:47

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/5bb60ea611db1e04814426ed4bd1c95d1487678e - () https://git.kernel.org/stable/c/5bb60ea611db1e04814426ed4bd1c95d1487678e - Patch
References () https://git.kernel.org/stable/c/c4e3ff8b8b1d54f0c755670174c453b06e17114b - () https://git.kernel.org/stable/c/c4e3ff8b8b1d54f0c755670174c453b06e17114b - Patch
References () https://git.kernel.org/stable/c/dfe906da9a1abebdebe8b15bb3e66a2578f6c4c7 - () https://git.kernel.org/stable/c/dfe906da9a1abebdebe8b15bb3e66a2578f6c4c7 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*
First Time Linux
Linux linux Kernel

21 Nov 2024, 06:36

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powerpc/32: corrige el bloqueo físico en el desbordamiento de la pila de vmap Desde El commit c118c7303ad5 ("powerpc/32: corrige la pila de vmap - No activar MMU antes de leer la estructura de la tarea") un desbordamiento de la pila de vmap resulta en un bloqueo duro. Esto se debe a que Emergency_ctx todavía se aborda con su dirección virtual, aunque la MMU de datos ya no esté activa en ese momento. Solucionarlo utilizando una dirección física en su lugar.
References () https://git.kernel.org/stable/c/5bb60ea611db1e04814426ed4bd1c95d1487678e - () https://git.kernel.org/stable/c/5bb60ea611db1e04814426ed4bd1c95d1487678e -
References () https://git.kernel.org/stable/c/c4e3ff8b8b1d54f0c755670174c453b06e17114b - () https://git.kernel.org/stable/c/c4e3ff8b8b1d54f0c755670174c453b06e17114b -
References () https://git.kernel.org/stable/c/dfe906da9a1abebdebe8b15bb3e66a2578f6c4c7 - () https://git.kernel.org/stable/c/dfe906da9a1abebdebe8b15bb3e66a2578f6c4c7 -

24 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-24 15:15

Updated : 2025-09-18 15:47


NVD link : CVE-2021-47567

Mitre link : CVE-2021-47567

CVE.ORG link : CVE-2021-47567


JSON object : View

Products Affected

linux

  • linux_kernel