CVE-2021-47221
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/05/2024
Last modified:
29/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mm/slub: actually fix freelist pointer vs redzoning<br />
<br />
It turns out that SLUB redzoning ("slub_debug=Z") checks from<br />
s->object_size rather than from s->inuse (which is normally bumped to<br />
make room for the freelist pointer), so a cache created with an object<br />
size less than 24 would have the freelist pointer written beyond<br />
s->object_size, causing the redzone to be corrupted by the freelist<br />
pointer. This was very visible with "slub_debug=ZF":<br />
<br />
BUG test (Tainted: G B ): Right Redzone overwritten<br />
-----------------------------------------------------------------------------<br />
<br />
INFO: 0xffff957ead1c05de-0xffff957ead1c05df @offset=1502. First byte 0x1a instead of 0xbb<br />
INFO: Slab 0xffffef3950b47000 objects=170 used=170 fp=0x0000000000000000 flags=0x8000000000000200<br />
INFO: Object 0xffff957ead1c05d8 @offset=1496 fp=0xffff957ead1c0620<br />
<br />
Redzone (____ptrval____): bb bb bb bb bb bb bb bb ........<br />
Object (____ptrval____): 00 00 00 00 00 f6 f4 a5 ........<br />
Redzone (____ptrval____): 40 1d e8 1a aa @....<br />
Padding (____ptrval____): 00 00 00 00 00 00 00 00 ........<br />
<br />
Adjust the offset to stay within s->object_size.<br />
<br />
(Note that no caches of in this size range are known to exist in the<br />
kernel currently.)
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.7 (including) | 5.10.46 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.12.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/ce6e8bee7a3883e8008b30f5887dbb426aac6a35
- https://git.kernel.org/stable/c/e41a49fadbc80b60b48d3c095d9e2ee7ef7c9a8e
- https://git.kernel.org/stable/c/f6ed2357541612a13a5841b3af4dc32ed984a25f
- https://git.kernel.org/stable/c/ce6e8bee7a3883e8008b30f5887dbb426aac6a35
- https://git.kernel.org/stable/c/e41a49fadbc80b60b48d3c095d9e2ee7ef7c9a8e
- https://git.kernel.org/stable/c/f6ed2357541612a13a5841b3af4dc32ed984a25f



