cvelist/2021/46xxx/CVE-2021-46928.json

103 lines
4.8 KiB
JSON
Raw Normal View History

2024-02-25 14:00:34 +00:00
{
2024-02-27 10:00:36 +00:00
"data_version": "4.0",
2024-02-25 14:00:34 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2021-46928",
2024-02-27 10:00:36 +00:00
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
2024-02-25 14:00:34 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-02-27 10:00:36 +00:00
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nparisc: Clear stale IIR value on instruction access rights trap\n\nWhen a trap 7 (Instruction access rights) occurs, this means the CPU\ncouldn't execute an instruction due to missing execute permissions on\nthe memory region. In this case it seems the CPU didn't even fetched\nthe instruction from memory and thus did not store it in the cr19 (IIR)\nregister before calling the trap handler. So, the trap handler will find\nsome random old stale value in cr19.\n\nThis patch simply overwrites the stale IIR value with a constant magic\n\"bad food\" value (0xbaadf00d), in the hope people don't start to try to\nunderstand the various random IIR values in trap 7 dumps."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "d01e9ce1af61"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "5.10.90",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
2024-11-04 12:01:27 +00:00
"versionType": "semver"
2024-02-27 10:00:36 +00:00
},
{
"version": "5.15.13",
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
2024-11-04 12:01:27 +00:00
"versionType": "semver"
2024-02-27 10:00:36 +00:00
},
{
"version": "5.16",
"lessThanOrEqual": "*",
"status": "unaffected",
2024-11-04 12:01:53 +00:00
"versionType": "semver"
2024-02-27 10:00:36 +00:00
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/d01e9ce1af6116f812491d3d3873d204f10ae0b8",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/d01e9ce1af6116f812491d3d3873d204f10ae0b8"
},
{
"url": "https://git.kernel.org/stable/c/e96373f0a5f484bc1e193f9951dcb3adf24bf3f7",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/e96373f0a5f484bc1e193f9951dcb3adf24bf3f7"
},
{
"url": "https://git.kernel.org/stable/c/484730e5862f6b872dca13840bed40fd7c60fa26",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/484730e5862f6b872dca13840bed40fd7c60fa26"
2024-02-25 14:00:34 +00:00
}
]
2024-02-27 10:00:36 +00:00
},
"generator": {
2024-11-04 12:01:53 +00:00
"engine": "bippy-c8e10e5f6187"
2024-02-25 14:00:34 +00:00
}
}