5.5
CVE-2021-46921
- EPSS 0.02%
 - Published 27.02.2024 10:15:06
 - Last modified 21.11.2024 06:34:56
 - Source 416baaa9-dc9f-4396-8d5f-8c081f
 - CVE-Watchlists
 - Open
 
In the Linux kernel, the following vulnerability has been resolved:
locking/qrwlock: Fix ordering in queued_write_lock_slowpath()
While this code is executed with the wait_lock held, a reader can
acquire the lock without holding wait_lock.  The writer side loops
checking the value with the atomic_cond_read_acquire(), but only truly
acquires the lock when the compare-and-exchange is completed
successfully which isn’t ordered. This exposes the window between the
acquire and the cmpxchg to an A-B-A problem which allows reads
following the lock acquisition to observe values speculatively before
the write lock is truly acquired.
We've seen a problem in epoll where the reader does a xchg while
holding the read lock, but the writer can see a value change out from
under it.
  Writer                                | Reader
  --------------------------------------------------------------------------------
  ep_scan_ready_list()                  |
  |- write_lock_irq()                   |
      |- queued_write_lock_slowpath()   |
	|- atomic_cond_read_acquire()   |
				        | read_lock_irqsave(&ep->lock, flags);
     --> (observes value before unlock) |  chain_epi_lockless()
     |                                  |    epi->next = xchg(&ep->ovflist, epi);
     |                                  | read_unlock_irqrestore(&ep->lock, flags);
     |                                  |
     |     atomic_cmpxchg_relaxed()     |
     |-- READ_ONCE(ep->ovflist);        |
A core can order the read of the ovflist ahead of the
atomic_cmpxchg_relaxed(). Switching the cmpxchg to use acquire
semantics addresses this issue at which point the atomic_cond_read can
be switched to use relaxed semantics.
[peterz: use try_cmpxchg()]Data is provided by the National Vulnerability Database (NVD)
	Linux ≫ Linux Kernel  Version >= 4.15.0 < 4.19.189
	Linux ≫ Linux Kernel  Version >= 4.20.0 < 5.4.115
	Linux ≫ Linux Kernel  Version >= 5.5.0 < 5.10.33
	Linux ≫ Linux Kernel  Version >= 5.11.0 < 5.11.17
| Type | Source | Score | Percentile | 
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.024 | 
| Source | Base Score | Exploit Score | Impact Score | Vector string | 
|---|---|---|---|---|
| nvd@nist.gov | 5.5 | 1.8 | 3.6 | 
                 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N  
             | 
        
CWE-668 Exposure of Resource to Wrong Sphere
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.