In the Linux kernel, the following vulnerability has been resolved:
mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page()
Hulk Robot reported a panic in put_page_testzero() when testing
madvise() with MADV_SOFT_OFFLINE. The BUG() is triggered when retrying
get_any_page(). This is because we keep MF_COUNT_INCREASED flag in
second try but the refcnt is not increased.
page dumped because: VM_BUG_ON_PAGE(page_ref_count(page) == 0)
------------[ cut here ]------------
kernel BUG at include/linux/mm.h:737!
invalid opcode: 0000 [#1] PREEMPT SMP
CPU: 5 PID: 2135 Comm: sshd Tainted: G B 5.16.0-rc6-dirty #373
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
RIP: release_pages+0x53f/0x840
Call Trace:
free_pages_and_swap_cache+0x64/0x80
tlb_flush_mmu+0x6f/0x220
unmap_page_range+0xe6c/0x12c0
unmap_single_vma+0x90/0x170
unmap_vmas+0xc4/0x180
exit_mmap+0xde/0x3a0
mmput+0xa3/0x250
do_exit+0x564/0x1470
do_group_exit+0x3b/0x100
__do_sys_exit_group+0x13/0x20
__x64_sys_exit_group+0x16/0x20
do_syscall_64+0x34/0x80
entry_SYSCALL_64_after_hwframe+0x44/0xae
Modules linked in:
---[ end trace e99579b570fe0649 ]---
RIP: 0010:release_pages+0x53f/0x840
References
Link | Resource |
---|---|
https://git.kernel.org/stable/c/1f207076740101fed87074a6bc924dbe806f08a5 | Exploit Mailing List Patch |
https://git.kernel.org/stable/c/2a57d83c78f889bf3f54eede908d0643c40d5418 | Exploit Mailing List Patch |
https://git.kernel.org/stable/c/c691e7575eff76e563b0199c23ec46bd454f43e3 | Exploit Mailing List Patch |
https://git.kernel.org/stable/c/1f207076740101fed87074a6bc924dbe806f08a5 | Exploit Mailing List Patch |
https://git.kernel.org/stable/c/2a57d83c78f889bf3f54eede908d0643c40d5418 | Exploit Mailing List Patch |
https://git.kernel.org/stable/c/c691e7575eff76e563b0199c23ec46bd454f43e3 | Exploit Mailing List Patch |
Configurations
Configuration 1 (hide)
|
History
14 Feb 2025, 14:31
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.16:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/1f207076740101fed87074a6bc924dbe806f08a5 - Exploit, Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/2a57d83c78f889bf3f54eede908d0643c40d5418 - Exploit, Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/c691e7575eff76e563b0199c23ec46bd454f43e3 - Exploit, Mailing List, Patch |
Information
Published : 2024-03-04 18:15
Updated : 2025-02-14 14:31
NVD link : CVE-2021-47090
Mitre link : CVE-2021-47090
CVE.ORG link : CVE-2021-47090
JSON object : View
Products Affected
linux
- linux_kernel
CWE