{
  "threat_severity" : "Low",
  "public_date" : "2024-07-16T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: powerpc/fixmap: Fix VM debug warning on unmap",
    "id" : "2298107",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2298107"
  },
  "cvss3" : {
    "cvss3_base_score" : "4.4",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-99",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\npowerpc/fixmap: Fix VM debug warning on unmap\nUnmapping a fixmap entry is done by calling __set_fixmap()\nwith FIXMAP_PAGE_CLEAR as flags.\nToday, powerpc __set_fixmap() calls map_kernel_page().\nmap_kernel_page() is not happy when called a second time\nfor the same page.\nWARNING: CPU: 0 PID: 1 at arch/powerpc/mm/pgtable.c:194 set_pte_at+0xc/0x1e8\nCPU: 0 PID: 1 Comm: swapper Not tainted 5.16.0-rc3-s3k-dev-01993-g350ff07feb7d-dirty #682\nNIP:  c0017cd4 LR: c00187f0 CTR: 00000010\nREGS: e1011d50 TRAP: 0700   Not tainted  (5.16.0-rc3-s3k-dev-01993-g350ff07feb7d-dirty)\nMSR:  00029032 <EE,ME,IR,DR,RI>  CR: 42000208  XER: 00000000\nGPR00: c0165fec e1011e10 c14c0000 c0ee2550 ff800000 c0f3d000 00000000 c001686c\nGPR08: 00001000 b00045a9 00000001 c0f58460 c0f50000 00000000 c0007e10 00000000\nGPR16: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000\nGPR24: 00000000 00000000 c0ee2550 00000000 c0f57000 00000ff8 00000000 ff800000\nNIP [c0017cd4] set_pte_at+0xc/0x1e8\nLR [c00187f0] map_kernel_page+0x9c/0x100\nCall Trace:\n[e1011e10] [c0736c68] vsnprintf+0x358/0x6c8 (unreliable)\n[e1011e30] [c0165fec] __set_fixmap+0x30/0x44\n[e1011e40] [c0c13bdc] early_iounmap+0x11c/0x170\n[e1011e70] [c0c06cb0] ioremap_legacy_serial_console+0x88/0xc0\n[e1011e90] [c0c03634] do_one_initcall+0x80/0x178\n[e1011ef0] [c0c0385c] kernel_init_freeable+0xb4/0x250\n[e1011f20] [c0007e34] kernel_init+0x24/0x140\n[e1011f30] [c0016268] ret_from_kernel_thread+0x5c/0x64\nInstruction dump:\n7fe3fb78 48019689 80010014 7c630034 83e1000c 5463d97e 7c0803a6 38210010\n4e800020 81250000 712a0001 41820008 <0fe00000> 9421ffe0 93e1001c 48000030\nImplement unmap_kernel_page() which clears an existing pte." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions",
    "release_date" : "2024-09-24T00:00:00Z",
    "advisory" : "RHSA-2024:6991",
    "cpe" : "cpe:/a:redhat:rhel_e4s:9.0",
    "package" : "kernel-0:5.14.0-70.117.1.el9_0"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2021-47623\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47623\nhttps://lore.kernel.org/linux-cve-announce/2024071645-CVE-2021-47623-407f@gregkh/T" ],
  "name" : "CVE-2021-47623",
  "csaw" : false
}