CVE-2021-47185
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
10/04/2024
Last modified:
21/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc<br />
<br />
When running ltp testcase(ltp/testcases/kernel/pty/pty04.c) with arm64, there is a soft lockup,<br />
which look like this one:<br />
<br />
Workqueue: events_unbound flush_to_ldisc<br />
Call trace:<br />
dump_backtrace+0x0/0x1ec<br />
show_stack+0x24/0x30<br />
dump_stack+0xd0/0x128<br />
panic+0x15c/0x374<br />
watchdog_timer_fn+0x2b8/0x304<br />
__run_hrtimer+0x88/0x2c0<br />
__hrtimer_run_queues+0xa4/0x120<br />
hrtimer_interrupt+0xfc/0x270<br />
arch_timer_handler_phys+0x40/0x50<br />
handle_percpu_devid_irq+0x94/0x220<br />
__handle_domain_irq+0x88/0xf0<br />
gic_handle_irq+0x84/0xfc<br />
el1_irq+0xc8/0x180<br />
slip_unesc+0x80/0x214 [slip]<br />
tty_ldisc_receive_buf+0x64/0x80<br />
tty_port_default_receive_buf+0x50/0x90<br />
flush_to_ldisc+0xbc/0x110<br />
process_one_work+0x1d4/0x4b0<br />
worker_thread+0x180/0x430<br />
kthread+0x11c/0x120<br />
<br />
In the testcase pty04, The first process call the write syscall to send<br />
data to the pty master. At the same time, the workqueue will do the<br />
flush_to_ldisc to pop data in a loop until there is no more data left.<br />
When the sender and workqueue running in different core, the sender sends<br />
data fastly in full time which will result in workqueue doing work in loop<br />
for a long time and occuring softlockup in flush_to_ldisc with kernel<br />
configured without preempt. So I add need_resched check and cond_resched<br />
in the flush_to_ldisc loop to avoid it.
Impact
Base Score 3.x
4.40
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.4.293 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.5 (including) | 4.9.291 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 4.14.256 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.218 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.162 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.82 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.5 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0380f643f3a7a61b0845cdc738959c2ad5735d61
- https://git.kernel.org/stable/c/3968ddcf05fb4b9409cd1859feb06a5b0550a1c1
- https://git.kernel.org/stable/c/4c1623651a0936ee197859824cdae6ebbd04d3ed
- https://git.kernel.org/stable/c/4f300f47dbcf9c3d4b2ea76c8554c8f360400725
- https://git.kernel.org/stable/c/5c34486f04700f1ba04907231dce0cc2705c2d7d
- https://git.kernel.org/stable/c/77e9fed33056f2a88eba9dd4d2d5412f0c7d1f41
- https://git.kernel.org/stable/c/b1ffc16ec05ae40d82b6e373322d62e9d6b54fbc
- https://git.kernel.org/stable/c/d491c84df5c469dd9621863b6a770b3428137063
- https://git.kernel.org/stable/c/0380f643f3a7a61b0845cdc738959c2ad5735d61
- https://git.kernel.org/stable/c/3968ddcf05fb4b9409cd1859feb06a5b0550a1c1
- https://git.kernel.org/stable/c/4c1623651a0936ee197859824cdae6ebbd04d3ed
- https://git.kernel.org/stable/c/4f300f47dbcf9c3d4b2ea76c8554c8f360400725
- https://git.kernel.org/stable/c/5c34486f04700f1ba04907231dce0cc2705c2d7d
- https://git.kernel.org/stable/c/77e9fed33056f2a88eba9dd4d2d5412f0c7d1f41
- https://git.kernel.org/stable/c/b1ffc16ec05ae40d82b6e373322d62e9d6b54fbc
- https://git.kernel.org/stable/c/d491c84df5c469dd9621863b6a770b3428137063



