CVE-2021-47035

In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Remove WO permissions on second-level paging entries When the first level page table is used for IOVA translation, it only supports Read-Only and Read-Write permissions. The Write-Only permission is not supported as the PRESENT bit (implying Read permission) should always set. When using second level, we still give separate permissions that allows WriteOnly which seems inconsistent and awkward. We want to have consistent behavior. After moving to 1st level, we don't want things to work sometimes, and break if we use 2nd level for the same mappings. Hence remove this configuration.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

09 Jan 2025, 15:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/25faff78138933244c678c7fc78f7c0340fa04a0 - () https://git.kernel.org/stable/c/25faff78138933244c678c7fc78f7c0340fa04a0 - Patch
References () https://git.kernel.org/stable/c/66c24699f266ff310381a9552d3576eea8ad6e20 - () https://git.kernel.org/stable/c/66c24699f266ff310381a9552d3576eea8ad6e20 - Patch
References () https://git.kernel.org/stable/c/89bd620798704a8805fc9db0d71d7f812cf5b3d2 - () https://git.kernel.org/stable/c/89bd620798704a8805fc9db0d71d7f812cf5b3d2 - Patch
References () https://git.kernel.org/stable/c/c848416cc05afc1589edba04fe00b85c2f797ee3 - () https://git.kernel.org/stable/c/c848416cc05afc1589edba04fe00b85c2f797ee3 - Patch
References () https://git.kernel.org/stable/c/eea53c5816889ee8b64544fa2e9311a81184ff9c - () https://git.kernel.org/stable/c/eea53c5816889ee8b64544fa2e9311a81184ff9c - Patch

21 Nov 2024, 06:35

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iommu/vt-d: elimina los permisos WO en las entradas de paginación de segundo nivel. Cuando la tabla de páginas de primer nivel se utiliza para la traducción IOVA, solo admite permisos de solo lectura y lectura-escritura. . El permiso de sólo escritura no se admite ya que el bit PRESENTE (que implica permiso de lectura) siempre debe establecerse. Cuando usamos el segundo nivel, todavía otorgamos permisos separados que permiten WriteOnly, lo que parece inconsistente e incómodo. Queremos tener un comportamiento consistente. Después de pasar al primer nivel, no queremos que las cosas funcionen a veces y se rompan si usamos el segundo nivel para las mismas asignaciones. Por lo tanto, elimine esta configuración.
References () https://git.kernel.org/stable/c/25faff78138933244c678c7fc78f7c0340fa04a0 - () https://git.kernel.org/stable/c/25faff78138933244c678c7fc78f7c0340fa04a0 -
References () https://git.kernel.org/stable/c/66c24699f266ff310381a9552d3576eea8ad6e20 - () https://git.kernel.org/stable/c/66c24699f266ff310381a9552d3576eea8ad6e20 -
References () https://git.kernel.org/stable/c/89bd620798704a8805fc9db0d71d7f812cf5b3d2 - () https://git.kernel.org/stable/c/89bd620798704a8805fc9db0d71d7f812cf5b3d2 -
References () https://git.kernel.org/stable/c/c848416cc05afc1589edba04fe00b85c2f797ee3 - () https://git.kernel.org/stable/c/c848416cc05afc1589edba04fe00b85c2f797ee3 -
References () https://git.kernel.org/stable/c/eea53c5816889ee8b64544fa2e9311a81184ff9c - () https://git.kernel.org/stable/c/eea53c5816889ee8b64544fa2e9311a81184ff9c -

28 Feb 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-28 09:15

Updated : 2025-01-24 16:15


NVD link : CVE-2021-47035

Mitre link : CVE-2021-47035

CVE.ORG link : CVE-2021-47035


JSON object : View

Products Affected

linux

  • linux_kernel