CVE-2021-47553
📋 TL;DR
A Linux kernel vulnerability where CPU hotplug operations leave stale shadow call stack (SCS) and KASAN shadow memory in idle tasks, causing memory leaks and potential false KASAN warnings. This affects systems using KASAN or SCS with CPU hotplug capabilities. Exploitation requires local access to trigger CPU offlining/onlining.
💻 Affected Systems
- Linux Kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Memory corruption leading to kernel crashes, denial of service, or false security warnings that mask real threats.
Likely Case
Gradual memory exhaustion from SCS leaks and false positive KASAN alerts during CPU hotplug cycles.
If Mitigated
Minor performance impact from memory leaks if hotplug is infrequent.
🎯 Exploit Status
Exploitation requires local access and ability to trigger CPU hotplug operations, typically needing elevated privileges.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in kernel commits 229c555260cb9c1ccdab861e16f0410f1718f302 and later
Vendor Advisory: https://git.kernel.org/stable/c/229c555260cb9c1ccdab861e16f0410f1718f302
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution. 2. For custom kernels: apply commits 229c555260cb9c1ccdab861e16f0410f1718f302 and dce1ca0525bfdc8a69a9343bc714fbc19a2f04b3. 3. Reboot system.
🔧 Temporary Workarounds
Disable CPU Hotplug
linuxPrevent CPU offlining/onlining to avoid triggering the vulnerability
echo 0 | sudo tee /sys/devices/system/cpu/cpu*/online 2>/dev/null || true
sudo chattr +i /sys/devices/system/cpu/cpu*/online
Disable KASAN/SCS Features
linuxDisable kernel address sanitizer and shadow call stack if not required
Rebuild kernel without CONFIG_KASAN and CONFIG_SHADOW_CALL_STACK
🧯 If You Can't Patch
- Restrict CPU hotplug permissions to root only
- Monitor system logs for KASAN warnings and CPU hotplug events
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if KASAN/SCS are enabled: uname -r && grep -E 'CONFIG_KASAN|CONFIG_SHADOW_CALL_STACK' /boot/config-$(uname -r)
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is after fix commits and test CPU hotplug: echo 0 > /sys/devices/system/cpu/cpu1/online && echo 1 > /sys/devices/system/cpu/cpu1/online
📡 Detection & Monitoring
Log Indicators:
- KASAN: stack-out-of-bounds warnings
- CPU hotplug events in kernel logs
- Memory allocation failures
Network Indicators:
- None - local vulnerability only
SIEM Query:
source="kernel" AND ("KASAN" OR "CPU.*hotplug" OR "shadow call stack")
🔗 References
- https://git.kernel.org/stable/c/229c555260cb9c1ccdab861e16f0410f1718f302
- https://git.kernel.org/stable/c/dce1ca0525bfdc8a69a9343bc714fbc19a2f04b3
- https://git.kernel.org/stable/c/e6ee7abd6bfe559ad9989004b34c320fd638c526
- https://git.kernel.org/stable/c/229c555260cb9c1ccdab861e16f0410f1718f302
- https://git.kernel.org/stable/c/dce1ca0525bfdc8a69a9343bc714fbc19a2f04b3
- https://git.kernel.org/stable/c/e6ee7abd6bfe559ad9989004b34c320fd638c526