CVE-2021-46910
Vulnerability from cvelistv5
Published
2024-02-27 06:53
Modified
2024-11-04 11:55
Severity ?
EPSS score ?
Summary
ARM: 9063/1: mm: reduce maximum number of CPUs if DEBUG_KMAP_LOCAL is enabled
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.862Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5965ac11b1d5fcb38464728931649cd9df79c7c9" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d624833f5984d484c5e3196f34b926f9e71dafee" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-46910", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:02:10.448289Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:34.915Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "arch/arm/Kconfig", "arch/arm/mm/mmu.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "5965ac11b1d5", "status": "affected", "version": "2a15ba82fa6c", "versionType": "git" }, { "lessThan": "d624833f5984", "status": "affected", "version": "2a15ba82fa6c", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "arch/arm/Kconfig", "arch/arm/mm/mmu.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.11" }, { "lessThan": "5.11", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.11.*", "status": "unaffected", "version": "5.11.16", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "5.12", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: 9063/1: mm: reduce maximum number of CPUs if DEBUG_KMAP_LOCAL is enabled\n\nThe debugging code for kmap_local() doubles the number of per-CPU fixmap\nslots allocated for kmap_local(), in order to use half of them as guard\nregions. This causes the fixmap region to grow downwards beyond the start\nof its reserved window if the supported number of CPUs is large, and collide\nwith the newly added virtual DT mapping right below it, which is obviously\nnot good.\n\nOne manifestation of this is EFI boot on a kernel built with NR_CPUS=32\nand CONFIG_DEBUG_KMAP_LOCAL=y, which may pass the FDT in highmem, resulting\nin block entries below the fixmap region that the fixmap code misidentifies\nas fixmap table entries, and subsequently tries to dereference using a\nphys-to-virt translation that is only valid for lowmem. This results in a\ncryptic splat such as the one below.\n\n ftrace: allocating 45548 entries in 89 pages\n 8\u003c--- cut here ---\n Unable to handle kernel paging request at virtual address fc6006f0\n pgd = (ptrval)\n [fc6006f0] *pgd=80000040207003, *pmd=00000000\n Internal error: Oops: a06 [#1] SMP ARM\n Modules linked in:\n CPU: 0 PID: 0 Comm: swapper Not tainted 5.11.0+ #382\n Hardware name: Generic DT based system\n PC is at cpu_ca15_set_pte_ext+0x24/0x30\n LR is at __set_fixmap+0xe4/0x118\n pc : [\u003cc041ac9c\u003e] lr : [\u003cc04189d8\u003e] psr: 400000d3\n sp : c1601ed8 ip : 00400000 fp : 00800000\n r10: 0000071f r9 : 00421000 r8 : 00c00000\n r7 : 00c00000 r6 : 0000071f r5 : ffade000 r4 : 4040171f\n r3 : 00c00000 r2 : 4040171f r1 : c041ac78 r0 : fc6006f0\n Flags: nZcv IRQs off FIQs off Mode SVC_32 ISA ARM Segment none\n Control: 30c5387d Table: 40203000 DAC: 00000001\n Process swapper (pid: 0, stack limit = 0x(ptrval))\n\nSo let\u0027s limit CONFIG_NR_CPUS to 16 when CONFIG_DEBUG_KMAP_LOCAL=y. Also,\nfix the BUILD_BUG_ON() check that was supposed to catch this, by checking\nwhether the region grows below the start address rather than above the end\naddress." } ], "providerMetadata": { "dateUpdated": "2024-11-04T11:55:42.154Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/5965ac11b1d5fcb38464728931649cd9df79c7c9" }, { "url": "https://git.kernel.org/stable/c/d624833f5984d484c5e3196f34b926f9e71dafee" } ], "title": "ARM: 9063/1: mm: reduce maximum number of CPUs if DEBUG_KMAP_LOCAL is enabled", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2021-46910", "datePublished": "2024-02-27T06:53:50.828Z", "dateReserved": "2024-02-25T13:45:52.718Z", "dateUpdated": "2024-11-04T11:55:42.154Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-46910\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-02-27T07:15:07.307\",\"lastModified\":\"2024-11-21T06:34:54.770\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nARM: 9063/1: mm: reduce maximum number of CPUs if DEBUG_KMAP_LOCAL is enabled\\n\\nThe debugging code for kmap_local() doubles the number of per-CPU fixmap\\nslots allocated for kmap_local(), in order to use half of them as guard\\nregions. This causes the fixmap region to grow downwards beyond the start\\nof its reserved window if the supported number of CPUs is large, and collide\\nwith the newly added virtual DT mapping right below it, which is obviously\\nnot good.\\n\\nOne manifestation of this is EFI boot on a kernel built with NR_CPUS=32\\nand CONFIG_DEBUG_KMAP_LOCAL=y, which may pass the FDT in highmem, resulting\\nin block entries below the fixmap region that the fixmap code misidentifies\\nas fixmap table entries, and subsequently tries to dereference using a\\nphys-to-virt translation that is only valid for lowmem. This results in a\\ncryptic splat such as the one below.\\n\\n ftrace: allocating 45548 entries in 89 pages\\n 8\u003c--- cut here ---\\n Unable to handle kernel paging request at virtual address fc6006f0\\n pgd = (ptrval)\\n [fc6006f0] *pgd=80000040207003, *pmd=00000000\\n Internal error: Oops: a06 [#1] SMP ARM\\n Modules linked in:\\n CPU: 0 PID: 0 Comm: swapper Not tainted 5.11.0+ #382\\n Hardware name: Generic DT based system\\n PC is at cpu_ca15_set_pte_ext+0x24/0x30\\n LR is at __set_fixmap+0xe4/0x118\\n pc : [\u003cc041ac9c\u003e] lr : [\u003cc04189d8\u003e] psr: 400000d3\\n sp : c1601ed8 ip : 00400000 fp : 00800000\\n r10: 0000071f r9 : 00421000 r8 : 00c00000\\n r7 : 00c00000 r6 : 0000071f r5 : ffade000 r4 : 4040171f\\n r3 : 00c00000 r2 : 4040171f r1 : c041ac78 r0 : fc6006f0\\n Flags: nZcv IRQs off FIQs off Mode SVC_32 ISA ARM Segment none\\n Control: 30c5387d Table: 40203000 DAC: 00000001\\n Process swapper (pid: 0, stack limit = 0x(ptrval))\\n\\nSo let\u0027s limit CONFIG_NR_CPUS to 16 when CONFIG_DEBUG_KMAP_LOCAL=y. Also,\\nfix the BUILD_BUG_ON() check that was supposed to catch this, by checking\\nwhether the region grows below the start address rather than above the end\\naddress.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ARM: 9063/1: mm: reduce el n\u00famero m\u00e1ximo de CPU si DEBUG_KMAP_LOCAL est\u00e1 habilitado El c\u00f3digo de depuraci\u00f3n para kmap_local() duplica el n\u00famero de ranuras de mapas de reparaci\u00f3n por CPU asignadas para kmap_local() , para utilizar la mitad de ellos como regiones de guardia. Esto hace que la regi\u00f3n del mapa de arreglos crezca hacia abajo m\u00e1s all\u00e1 del inicio de su ventana reservada si la cantidad de CPU admitidas es grande, y colisiona con el mapeo de DT virtual reci\u00e9n agregado justo debajo, lo cual obviamente no es bueno. Una manifestaci\u00f3n de esto es el arranque EFI en un kernel creado con NR_CPUS=32 y CONFIG_DEBUG_KMAP_LOCAL=y, que puede pasar la FDT en highmem, lo que genera entradas de bloque debajo de la regi\u00f3n de fixmap que el c\u00f3digo de fixmap identifica err\u00f3neamente como entradas de la tabla de fixmap y, posteriormente, intenta desreferencia usando una traducci\u00f3n de phys a virt que solo es v\u00e1lida para lowmem. Esto da como resultado un s\u00edmbolo cr\u00edptico como el que se muestra a continuaci\u00f3n. ftrace: asignando 45548 entradas en 89 p\u00e1ginas 8\u0026lt;--- cortar aqu\u00ed --- No se puede manejar la solicitud de paginaci\u00f3n del kernel en la direcci\u00f3n virtual fc6006f0 pgd = (ptrval) [fc6006f0] *pgd=80000040207003, *pmd=00000000 Error interno: Ups: a06 [#1] M\u00f3dulos SMP ARM vinculados en: CPU: 0 PID: 0 Comm: swapper Not tainted 5.11.0+ #382 Nombre del hardware: Sistema gen\u00e9rico basado en DT La PC est\u00e1 en cpu_ca15_set_pte_ext+0x24/0x30 LR est\u00e1 en __set_fixmap+0xe4/ 0x118 pc: [] lr: [] psr: 400000d3 sp: c1601ed8 ip: 00400000 fp: 00800000 r10: 0000071f r9: 00421000 r8: 00c00000 r7: 00c00000 r6: 0000071f r5: ffade000 r4: 4040171f r3: 00c00000 r2: 4040171f r1: c041ac78 r0: fc6006f0 Banderas: nZcv IRQ desactivadas FIQ desactivadas Modo SVC_32 ISA ARM Segmento ninguno Control: 30c5387d Tabla: 40203000 DAC: 00000001 Intercambiador de procesos (pid: 0, l\u00edmite de pila = 0x(ptr) val)) As\u00ed que limitemos CONFIG_NR_CPUS a 16 cuando CONFIG_DEBUG_KMAP_LOCAL=y. Adem\u00e1s, corrija la verificaci\u00f3n BUILD_BUG_ON() que se supon\u00eda detectar\u00eda esto, verificando si la regi\u00f3n crece por debajo de la direcci\u00f3n inicial en lugar de por encima de la direcci\u00f3n final.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11.0\",\"versionEndExcluding\":\"5.11.16\",\"matchCriteriaId\":\"3C5242B9-B5BD-4578-AD66-69DF59D54A14\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/5965ac11b1d5fcb38464728931649cd9df79c7c9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d624833f5984d484c5e3196f34b926f9e71dafee\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5965ac11b1d5fcb38464728931649cd9df79c7c9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d624833f5984d484c5e3196f34b926f9e71dafee\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.