In the Linux kernel, the following vulnerability has been resolved:
powerpc/32: Fix hardlockup on vmap stack overflow
Since the commit c118c7303ad5 ("powerpc/32: Fix vmap stack - Do not
activate MMU before reading task struct") a vmap stack overflow
results in a hard lockup. This is because emergency_ctx is still
addressed with its virtual address allthough data MMU is not active
anymore at that time.
Fix it by using a physical address instead.
Metrics
Affected Vendors & Products
References
History
Fri, 20 Dec 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Linux
Published: 2024-05-24T15:12:54.081Z
Updated: 2025-05-04T12:41:44.062Z
Reserved: 2024-05-24T15:11:00.728Z
Link: CVE-2021-47567

Updated: 2024-08-04T05:39:59.830Z

Status : Awaiting Analysis
Published: 2024-05-24T15:15:21.837
Modified: 2024-11-21T06:36:34.383
Link: CVE-2021-47567
