CVE-2021-46953: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure When failing the driver probe because of invalid firmware properties, the GTDT driver unmaps the interrupt that it mapped earlier. However, it never checks whether the mapping of the interrupt actially succeeded. Even more, should the firmware report an illegal interrupt number that overlaps with the GIC SGI range, this can result in an IPI being unmapped, and subsequent fireworks (as reported by Dann Frazier). Rework the driver to have a slightly saner behaviour and actually check whether the interrupt has been mapped before unmapping things.
AI Analysis
Technical Summary
CVE-2021-46953 is a vulnerability identified in the Linux kernel's ACPI GTDT (Generic Timer Description Table) driver. The issue arises during the driver's probe phase when it attempts to map interrupts based on firmware properties. If the firmware provides invalid or illegal interrupt numbers, particularly those overlapping with the GIC (Generic Interrupt Controller) SGI (Software Generated Interrupt) range, the driver may unmap interrupts incorrectly without verifying if the initial mapping was successful. This improper unmapping can lead to the removal of critical inter-processor interrupts (IPIs), causing unpredictable system behavior or 'fireworks' as described by the reporter. The root cause is the lack of validation before unmapping interrupts during a probe failure, which can corrupt interrupt mappings and potentially disrupt the kernel's interrupt handling mechanisms. The fix involves reworking the driver logic to ensure that unmapping only occurs if the interrupt was successfully mapped initially, thereby preventing inadvertent removal of valid interrupt mappings.
Potential Impact
For European organizations relying on Linux-based systems, especially those using kernels with the affected GTDT driver versions, this vulnerability can lead to system instability or crashes due to corrupted interrupt mappings. This is particularly critical for environments running multi-core processors where IPIs are essential for inter-processor communication. Disruption in interrupt handling can degrade system availability and reliability, impacting critical infrastructure, cloud services, and enterprise servers. While there are no known exploits in the wild, the vulnerability could be leveraged by attackers with local access or through crafted firmware to cause denial of service or potentially escalate privileges by destabilizing kernel operations. Given the widespread use of Linux in European data centers, telecommunications, and industrial control systems, the impact could be significant if exploited.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Since the issue lies in the ACPI GTDT driver, organizations should audit systems that rely on ACPI and GTDT for interrupt management, particularly those running on ARM architectures or platforms using GIC. Firmware validation processes should be enhanced to ensure that invalid interrupt numbers are not propagated to the kernel. Additionally, system administrators should monitor kernel logs for unusual interrupt mapping errors or probe failures. For environments where immediate patching is not feasible, isolating vulnerable systems from untrusted firmware updates and restricting local access can reduce exploitation risk. Collaboration with hardware vendors to ensure firmware compliance with interrupt specifications is also recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2021-46953: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure When failing the driver probe because of invalid firmware properties, the GTDT driver unmaps the interrupt that it mapped earlier. However, it never checks whether the mapping of the interrupt actially succeeded. Even more, should the firmware report an illegal interrupt number that overlaps with the GIC SGI range, this can result in an IPI being unmapped, and subsequent fireworks (as reported by Dann Frazier). Rework the driver to have a slightly saner behaviour and actually check whether the interrupt has been mapped before unmapping things.
AI-Powered Analysis
Technical Analysis
CVE-2021-46953 is a vulnerability identified in the Linux kernel's ACPI GTDT (Generic Timer Description Table) driver. The issue arises during the driver's probe phase when it attempts to map interrupts based on firmware properties. If the firmware provides invalid or illegal interrupt numbers, particularly those overlapping with the GIC (Generic Interrupt Controller) SGI (Software Generated Interrupt) range, the driver may unmap interrupts incorrectly without verifying if the initial mapping was successful. This improper unmapping can lead to the removal of critical inter-processor interrupts (IPIs), causing unpredictable system behavior or 'fireworks' as described by the reporter. The root cause is the lack of validation before unmapping interrupts during a probe failure, which can corrupt interrupt mappings and potentially disrupt the kernel's interrupt handling mechanisms. The fix involves reworking the driver logic to ensure that unmapping only occurs if the interrupt was successfully mapped initially, thereby preventing inadvertent removal of valid interrupt mappings.
Potential Impact
For European organizations relying on Linux-based systems, especially those using kernels with the affected GTDT driver versions, this vulnerability can lead to system instability or crashes due to corrupted interrupt mappings. This is particularly critical for environments running multi-core processors where IPIs are essential for inter-processor communication. Disruption in interrupt handling can degrade system availability and reliability, impacting critical infrastructure, cloud services, and enterprise servers. While there are no known exploits in the wild, the vulnerability could be leveraged by attackers with local access or through crafted firmware to cause denial of service or potentially escalate privileges by destabilizing kernel operations. Given the widespread use of Linux in European data centers, telecommunications, and industrial control systems, the impact could be significant if exploited.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Since the issue lies in the ACPI GTDT driver, organizations should audit systems that rely on ACPI and GTDT for interrupt management, particularly those running on ARM architectures or platforms using GIC. Firmware validation processes should be enhanced to ensure that invalid interrupt numbers are not propagated to the kernel. Additionally, system administrators should monitor kernel logs for unusual interrupt mapping errors or probe failures. For environments where immediate patching is not feasible, isolating vulnerable systems from untrusted firmware updates and restricting local access can reduce exploitation risk. Collaboration with hardware vendors to ensure firmware compliance with interrupt specifications is also recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-25T13:45:52.722Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9834c4522896dcbe98ac
Added to database: 5/21/2025, 9:09:08 AM
Last enriched: 6/30/2025, 5:57:36 PM
Last updated: 8/3/2025, 6:31:50 PM
Views: 10
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.