In the Linux kernel, the following vulnerability has been resolved:
powerpc/32: Fix hardlockup on vmap stack overflow
Since the commit c118c7303ad5 ("powerpc/32: Fix vmap stack - Do not
activate MMU before reading task struct") a vmap stack overflow
results in a hard lockup. This is because emergency_ctx is still
addressed with its virtual address allthough data MMU is not active
anymore at that time.
Fix it by using a physical address instead.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-05-24T15:12:54.081Z
Updated: 2024-12-19T07:44:58.831Z
Reserved: 2024-05-24T15:11:00.728Z
Link: CVE-2021-47567
Vulnrichment
Updated: 2024-08-04T05:39:59.830Z
NVD
Status : Awaiting Analysis
Published: 2024-05-24T15:15:21.837
Modified: 2024-11-21T06:36:34.383
Link: CVE-2021-47567
Redhat