In the Linux kernel, the following vulnerability has been resolved:
powerpc/32: Fix hardlockup on vmap stack overflow
Since the commit c118c7303ad5 ("powerpc/32: Fix vmap stack - Do not
activate MMU before reading task struct") a vmap stack overflow
results in a hard lockup. This is because emergency_ctx is still
addressed with its virtual address allthough data MMU is not active
anymore at that time.
Fix it by using a physical address instead.
References
Configurations
Configuration 1 (hide)
|
History
18 Sep 2025, 15:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/5bb60ea611db1e04814426ed4bd1c95d1487678e - Patch | |
References | () https://git.kernel.org/stable/c/c4e3ff8b8b1d54f0c755670174c453b06e17114b - Patch | |
References | () https://git.kernel.org/stable/c/dfe906da9a1abebdebe8b15bb3e66a2578f6c4c7 - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:* |
|
First Time |
Linux
Linux linux Kernel |
21 Nov 2024, 06:36
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://git.kernel.org/stable/c/5bb60ea611db1e04814426ed4bd1c95d1487678e - | |
References | () https://git.kernel.org/stable/c/c4e3ff8b8b1d54f0c755670174c453b06e17114b - | |
References | () https://git.kernel.org/stable/c/dfe906da9a1abebdebe8b15bb3e66a2578f6c4c7 - |
24 May 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-24 15:15
Updated : 2025-09-18 15:47
NVD link : CVE-2021-47567
Mitre link : CVE-2021-47567
CVE.ORG link : CVE-2021-47567
JSON object : View
Products Affected
linux
- linux_kernel
CWE