Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-46928
HistoryFeb 27, 2024 - 12:00 a.m.

CVE-2021-46928

2024-02-2700:00:00
ubuntu.com
ubuntu.com
5
linux kernel
parisc architecture
instruction access rights
memory region
cpu
trap handler

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved: parisc:
Clear stale IIR value on instruction access rights trap When a trap 7
(Instruction access rights) occurs, this means the CPU couldn’t execute an
instruction due to missing execute permissions on the memory region. In
this case it seems the CPU didn’t even fetched the instruction from memory
and thus did not store it in the cr19 (IIR) register before calling the
trap handler. So, the trap handler will find some random old stale value in
cr19. This patch simply overwrites the stale IIR value with a constant
magic “bad food” value (0xbaadf00d), in the hope people don’t start to try
to understand the various random IIR values in trap 7 dumps.

Notes

Author Note
rodrigo-zaiden Only affects PA-RISC architecture, not supported by Ubuntu.

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%