Bugzilla – Bug 1220760
VUL-0: CVE-2021-47016: kernel: m68k: mvme147,mvme16x: Don't wipe PCC timer config bits
Last modified: 2024-04-29 07:10:52 UTC
In the Linux kernel, the following vulnerability has been resolved: m68k: mvme147,mvme16x: Don't wipe PCC timer config bits Don't clear the timer 1 configuration bits when clearing the interrupt flag and counter overflow. As Michael reported, "This results in no timer interrupts being delivered after the first. Initialization then hangs in calibrate_delay as the jiffies counter is not updated." On mvme16x, enable the timer after requesting the irq, consistent with mvme147. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-47016 https://www.cve.org/CVERecord?id=CVE-2021-47016 https://bugzilla.redhat.com/show_bug.cgi?id=2267200 https://lore.kernel.org/linux-cve-announce/2024022919-CVE-2021-47016-320d@gregkh/T/#u Patch: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=43262178c043
Tracking as affected: - cve/linux-5.3 Below cve/linux-5.3 are not affected. cve/linux-5.14, stable and SLE15-SP6 are already patched.
Just recognize that CONFIG_MVME16x and CONFIG_MVME147 is not set on cve/linux-5.3, so affected files are not built. Closing.
m68k is not a supported architecture. This one is invalid. Please close so