CVE-2021-46953: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure When failing the driver probe because of invalid firmware properties, the GTDT driver unmaps the interrupt that it mapped earlier. However, it never checks whether the mapping of the interrupt actially succeeded. Even more, should the firmware report an illegal interrupt number that overlaps with the GIC SGI range, this can result in an IPI being unmapped, and subsequent fireworks (as reported by Dann Frazier). Rework the driver to have a slightly saner behaviour and actually check whether the interrupt has been mapped before unmapping things.
AI Analysis
Technical Summary
CVE-2021-46953 is a vulnerability identified in the Linux kernel's ACPI GTDT (Generic Timer Description Table) driver. The issue arises during the driver's probe phase when it attempts to map interrupts based on firmware properties. If the firmware provides invalid or illegal interrupt numbers, particularly those overlapping with the GIC (Generic Interrupt Controller) SGI (Software Generated Interrupt) range, the driver may unmap interrupts incorrectly without verifying if the initial mapping was successful. This improper unmapping can lead to the removal of critical inter-processor interrupts (IPIs), causing unpredictable system behavior or 'fireworks' as described by the reporter. The root cause is the lack of validation before unmapping interrupts during a probe failure, which can corrupt interrupt mappings and potentially disrupt the kernel's interrupt handling mechanisms. The fix involves reworking the driver logic to ensure that unmapping only occurs if the interrupt was successfully mapped initially, thereby preventing inadvertent removal of valid interrupt mappings.
Potential Impact
For European organizations relying on Linux-based systems, especially those using kernels with the affected GTDT driver versions, this vulnerability can lead to system instability or crashes due to corrupted interrupt mappings. This is particularly critical for environments running multi-core processors where IPIs are essential for inter-processor communication. Disruption in interrupt handling can degrade system availability and reliability, impacting critical infrastructure, cloud services, and enterprise servers. While there are no known exploits in the wild, the vulnerability could be leveraged by attackers with local access or through crafted firmware to cause denial of service or potentially escalate privileges by destabilizing kernel operations. Given the widespread use of Linux in European data centers, telecommunications, and industrial control systems, the impact could be significant if exploited.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Since the issue lies in the ACPI GTDT driver, organizations should audit systems that rely on ACPI and GTDT for interrupt management, particularly those running on ARM architectures or platforms using GIC. Firmware validation processes should be enhanced to ensure that invalid interrupt numbers are not propagated to the kernel. Additionally, system administrators should monitor kernel logs for unusual interrupt mapping errors or probe failures. For environments where immediate patching is not feasible, isolating vulnerable systems from untrusted firmware updates and restricting local access can reduce exploitation risk. Collaboration with hardware vendors to ensure firmware compliance with interrupt specifications is also recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2021-46953: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure When failing the driver probe because of invalid firmware properties, the GTDT driver unmaps the interrupt that it mapped earlier. However, it never checks whether the mapping of the interrupt actially succeeded. Even more, should the firmware report an illegal interrupt number that overlaps with the GIC SGI range, this can result in an IPI being unmapped, and subsequent fireworks (as reported by Dann Frazier). Rework the driver to have a slightly saner behaviour and actually check whether the interrupt has been mapped before unmapping things.
AI-Powered Analysis
Technical Analysis
CVE-2021-46953 is a vulnerability identified in the Linux kernel's ACPI GTDT (Generic Timer Description Table) driver. The issue arises during the driver's probe phase when it attempts to map interrupts based on firmware properties. If the firmware provides invalid or illegal interrupt numbers, particularly those overlapping with the GIC (Generic Interrupt Controller) SGI (Software Generated Interrupt) range, the driver may unmap interrupts incorrectly without verifying if the initial mapping was successful. This improper unmapping can lead to the removal of critical inter-processor interrupts (IPIs), causing unpredictable system behavior or 'fireworks' as described by the reporter. The root cause is the lack of validation before unmapping interrupts during a probe failure, which can corrupt interrupt mappings and potentially disrupt the kernel's interrupt handling mechanisms. The fix involves reworking the driver logic to ensure that unmapping only occurs if the interrupt was successfully mapped initially, thereby preventing inadvertent removal of valid interrupt mappings.
Potential Impact
For European organizations relying on Linux-based systems, especially those using kernels with the affected GTDT driver versions, this vulnerability can lead to system instability or crashes due to corrupted interrupt mappings. This is particularly critical for environments running multi-core processors where IPIs are essential for inter-processor communication. Disruption in interrupt handling can degrade system availability and reliability, impacting critical infrastructure, cloud services, and enterprise servers. While there are no known exploits in the wild, the vulnerability could be leveraged by attackers with local access or through crafted firmware to cause denial of service or potentially escalate privileges by destabilizing kernel operations. Given the widespread use of Linux in European data centers, telecommunications, and industrial control systems, the impact could be significant if exploited.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Since the issue lies in the ACPI GTDT driver, organizations should audit systems that rely on ACPI and GTDT for interrupt management, particularly those running on ARM architectures or platforms using GIC. Firmware validation processes should be enhanced to ensure that invalid interrupt numbers are not propagated to the kernel. Additionally, system administrators should monitor kernel logs for unusual interrupt mapping errors or probe failures. For environments where immediate patching is not feasible, isolating vulnerable systems from untrusted firmware updates and restricting local access can reduce exploitation risk. Collaboration with hardware vendors to ensure firmware compliance with interrupt specifications is also recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-25T13:45:52.722Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9834c4522896dcbe98ac
Added to database: 5/21/2025, 9:09:08 AM
Last enriched: 6/30/2025, 5:57:36 PM
Last updated: 12/4/2025, 5:10:00 AM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11727: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codisto Omnichannel for WooCommerce: Google, Amazon, eBay & Walmart Integration – Powered by Codisto
HighCVE-2025-11379: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in roselldk WebP Express
MediumCVE-2025-62173: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting
HighCVE-2025-64055: n/a
UnknownCVE-2025-66404: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in Flux159 mcp-server-kubernetes
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.