Skip to main content

CVE-2021-47429: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47429cvecve-2021-47429
Published: Tue May 21 2024 (05/21/2024, 15:04:14 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: powerpc/64s: Fix unrecoverable MCE calling async handler from NMI The machine check handler is not considered NMI on 64s. The early handler is the true NMI handler, and then it schedules the machine_check_exception handler to run when interrupts are enabled. This works fine except the case of an unrecoverable MCE, where the true NMI is taken when MSR[RI] is clear, it can not recover, so it calls machine_check_exception directly so something might be done about it. Calling an async handler from NMI context can result in irq state and other things getting corrupted. This can also trigger the BUG at arch/powerpc/include/asm/interrupt.h:168 BUG_ON(!arch_irq_disabled_regs(regs) && !(regs->msr & MSR_EE)); Fix this by making an _async version of the handler which is called in the normal case, and a NMI version that is called for unrecoverable interrupts.

AI-Powered Analysis

AILast updated: 06/30/2025, 12:55:35 UTC

Technical Analysis

CVE-2021-47429 is a vulnerability identified in the Linux kernel specifically affecting the powerpc/64s architecture. The issue arises from improper handling of Machine Check Exceptions (MCE) within the kernel's interrupt management system. Normally, the machine check handler is not treated as a Non-Maskable Interrupt (NMI) on 64s architectures. Instead, an early handler processes the true NMI, and subsequently schedules the machine_check_exception handler to run when interrupts are enabled. However, in the case of an unrecoverable MCE, the true NMI is triggered when the Machine State Register's Recoverable Interrupt (MSR[RI]) bit is clear, indicating the system cannot recover. Under these conditions, the kernel directly calls the machine_check_exception handler from the NMI context. This is problematic because invoking an asynchronous handler from within an NMI context can corrupt the interrupt request (IRQ) state and other kernel data structures. This corruption can lead to kernel panics or BUG triggers, specifically at the code location arch/powerpc/include/asm/interrupt.h:168, where a BUG_ON assertion checks for proper IRQ disabling. The fix implemented involves creating two separate versions of the handler: an asynchronous version for normal cases and an NMI-specific version for unrecoverable interrupts, ensuring that the handler is called appropriately without corrupting kernel state. This vulnerability is technical and low-level, affecting the stability and reliability of Linux systems running on powerpc/64s hardware, potentially causing system crashes or unpredictable behavior under certain hardware error conditions. There are no known exploits in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations utilizing Linux systems on powerpc/64s architectures, this vulnerability could lead to system instability or crashes when unrecoverable machine check exceptions occur. This is particularly relevant for enterprises running specialized or legacy hardware based on the PowerPC 64-bit architecture, such as certain telecommunications infrastructure, embedded systems, or high-performance computing environments. The impact primarily affects system availability and integrity, as corrupted IRQ states can cause kernel panics or forced reboots, leading to downtime and potential data loss. Confidentiality is less directly impacted since this is not a data exposure vulnerability. However, the disruption of critical systems could indirectly affect business operations and service continuity. Given that the vulnerability triggers under hardware error conditions, the likelihood of exploitation is low, but the consequences of an unhandled unrecoverable MCE could be severe in mission-critical environments. European organizations with infrastructure relying on this architecture must consider the risk of unexpected outages and the operational impact thereof.

Mitigation Recommendations

Organizations should promptly apply the Linux kernel patch that addresses this vulnerability by separating the asynchronous and NMI-specific handlers for machine check exceptions on powerpc/64s systems. Since this is a kernel-level fix, updating to the latest stable kernel version containing the patch is essential. Additionally, organizations should: 1) Audit their hardware inventory to identify systems running the affected powerpc/64s architecture. 2) Implement robust hardware monitoring and predictive failure analysis to detect early signs of machine check exceptions, allowing preemptive maintenance or failover. 3) Ensure that kernel crash dump mechanisms (kdump) are configured to capture diagnostic information in case of a kernel panic, facilitating root cause analysis. 4) Test kernel updates in a controlled environment before deployment to avoid unintended disruptions. 5) Maintain up-to-date backups and disaster recovery plans to mitigate downtime impact. 6) Engage with hardware vendors for firmware updates or hardware replacements if unrecoverable MCEs are frequent, as this vulnerability exacerbates the impact of such hardware faults.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-21T14:58:30.828Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9833c4522896dcbe9114

Added to database: 5/21/2025, 9:09:07 AM

Last enriched: 6/30/2025, 12:55:35 PM

Last updated: 8/13/2025, 2:23:04 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats