CVE-2021-47044

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-47044
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-47044.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-47044
Related
Published
2024-02-28T09:15:40Z
Modified
2024-11-04T17:35:01Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

sched/fair: Fix shift-out-of-bounds in load_balance()

Syzbot reported a handful of occurrences where an sd->nrbalancefailed can grow to much higher values than one would expect.

A successful loadbalance() resets it to 0; a failed one increments it. Once it gets to sd->cachenicetries + 3, this *should* trigger an active balance, which will either set it to sd->cachenicetries+1 or reset it to 0. However, in case the to-be-active-balanced task is not allowed to run on env->dstcpu, then the increment is done without any further modification.

This could then be repeated ad nauseam, and would explain the absurdly high values reported by syzbot (86, 149). VincentG noted there is value in letting sd->cachenicetries grow, so the shift itself should be fixed. That means preventing:

""" If the value of the right operand is negative or is greater than or equal to the width of the promoted left operand, the behavior is undefined. """

Thus we need to cap the shift exponent to BITSPERTYPE(typeof(lefthand)) - 1.

I had a look around for other similar cases via coccinelle:

@expr@ position pos; expression E1; expression E2; @@ ( E1 >> E2@pos | E1 >> E2@pos )

@cst depends on expr@ position pos; expression expr.E1; constant cst; @@ ( E1 >> cst@pos | E1 << cst@pos )

@script:python depends on !cst@ pos << expr.pos; exp << expr.E2; @@ # Dirty hack to ignore constexpr if exp.upper() != exp: coccilib.report.print_report(pos[0], "Possible UB shift here")

The only other match in kernel/sched is rqclockthermal() which employs schedthermaldecay_shift, and that exponent is already capped to 10, so that one is fine.

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.38-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.38-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.38-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}