CVE-2021-47462

5.5 MEDIUM

📋 TL;DR

This CVE describes a Linux kernel memory policy vulnerability where mbind() allows illegal combinations of MPOL_F_NUMA_BALANCING and MPOL_LOCAL flags, leading to uninitialized memory access. This can cause kernel panics and system crashes. Systems running affected Linux kernel versions are vulnerable.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Kernel versions containing commit bda420b98505 up to patches 6d2aec9e123b and 9ee4e9ae98f1
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires specific mbind() operations with illegal flag combinations to trigger.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially causing data loss or corruption in active processes.

🟠

Likely Case

System instability or crash when specific memory policy operations are performed, requiring reboot to restore service.

🟢

If Mitigated

No impact if the vulnerability is not triggered through mbind() operations with illegal flag combinations.

🌐 Internet-Facing: LOW - Requires local access or ability to execute kernel-level operations.
🏢 Internal Only: MEDIUM - Local users or processes with appropriate permissions could trigger the vulnerability, potentially causing system-wide instability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to call mbind() system call with specific illegal flag combinations. Discovered through syzkaller fuzzing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches in commits 6d2aec9e123b and 9ee4e9ae98f1

Vendor Advisory: https://git.kernel.org/stable/c/6d2aec9e123bb9c49cb5c7fc654f25f81e688e8c

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing fixes 6d2aec9e123b or 9ee4e9ae98f1
2. Reboot system to load new kernel
3. Verify kernel version after reboot

🔧 Temporary Workarounds

Restrict mbind() system call

linux

Use seccomp or other security mechanisms to restrict mbind() system call usage

Custom seccomp policy required based on distribution

🧯 If You Can't Patch

  • Monitor for kernel panic events and investigate processes using mbind()
  • Restrict user access to systems where kernel patching is not possible

🔍 How to Verify

Check if Vulnerable:

Check kernel version: uname -r and compare with affected versions containing commit bda420b98505

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fixes 6d2aec9e123b or 9ee4e9ae98f1: grep -q '6d2aec9e123b\|9ee4e9ae98f1' /proc/version

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • KMSAN uninitialized memory warnings
  • System crash/reboot events

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("panic" OR "KMSAN" OR "uninit-value" OR "mbind")

🔗 References

📤 Share & Export