Skip to main content

CVE-2021-46953: Vulnerability in Linux Linux

High
VulnerabilityCVE-2021-46953cvecve-2021-46953
Published: Tue Feb 27 2024 (02/27/2024, 18:40:35 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure When failing the driver probe because of invalid firmware properties, the GTDT driver unmaps the interrupt that it mapped earlier. However, it never checks whether the mapping of the interrupt actially succeeded. Even more, should the firmware report an illegal interrupt number that overlaps with the GIC SGI range, this can result in an IPI being unmapped, and subsequent fireworks (as reported by Dann Frazier). Rework the driver to have a slightly saner behaviour and actually check whether the interrupt has been mapped before unmapping things.

AI-Powered Analysis

AILast updated: 06/30/2025, 17:57:36 UTC

Technical Analysis

CVE-2021-46953 is a vulnerability identified in the Linux kernel's ACPI GTDT (Generic Timer Description Table) driver. The issue arises during the driver's probe phase when it attempts to map interrupts based on firmware properties. If the firmware provides invalid or illegal interrupt numbers, particularly those overlapping with the GIC (Generic Interrupt Controller) SGI (Software Generated Interrupt) range, the driver may unmap interrupts incorrectly without verifying if the initial mapping was successful. This improper unmapping can lead to the removal of critical inter-processor interrupts (IPIs), causing unpredictable system behavior or 'fireworks' as described by the reporter. The root cause is the lack of validation before unmapping interrupts during a probe failure, which can corrupt interrupt mappings and potentially disrupt the kernel's interrupt handling mechanisms. The fix involves reworking the driver logic to ensure that unmapping only occurs if the interrupt was successfully mapped initially, thereby preventing inadvertent removal of valid interrupt mappings.

Potential Impact

For European organizations relying on Linux-based systems, especially those using kernels with the affected GTDT driver versions, this vulnerability can lead to system instability or crashes due to corrupted interrupt mappings. This is particularly critical for environments running multi-core processors where IPIs are essential for inter-processor communication. Disruption in interrupt handling can degrade system availability and reliability, impacting critical infrastructure, cloud services, and enterprise servers. While there are no known exploits in the wild, the vulnerability could be leveraged by attackers with local access or through crafted firmware to cause denial of service or potentially escalate privileges by destabilizing kernel operations. Given the widespread use of Linux in European data centers, telecommunications, and industrial control systems, the impact could be significant if exploited.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Since the issue lies in the ACPI GTDT driver, organizations should audit systems that rely on ACPI and GTDT for interrupt management, particularly those running on ARM architectures or platforms using GIC. Firmware validation processes should be enhanced to ensure that invalid interrupt numbers are not propagated to the kernel. Additionally, system administrators should monitor kernel logs for unusual interrupt mapping errors or probe failures. For environments where immediate patching is not feasible, isolating vulnerable systems from untrusted firmware updates and restricting local access can reduce exploitation risk. Collaboration with hardware vendors to ensure firmware compliance with interrupt specifications is also recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-25T13:45:52.722Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9834c4522896dcbe98ac

Added to database: 5/21/2025, 9:09:08 AM

Last enriched: 6/30/2025, 5:57:36 PM

Last updated: 8/3/2025, 6:31:50 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats