7.8
HIGH
CVE-2021-47646
Linux Kernel Uninitialized Pointer Dereference in BFQ Block Driver
Description

In the Linux kernel, the following vulnerability has been resolved: Revert "Revert "block, bfq: honor already-setup queue merges"" A crash [1] happened to be triggered in conjunction with commit 2d52c58b9c9b ("block, bfq: honor already-setup queue merges"). The latter was then reverted by commit ebc69e897e17 ("Revert "block, bfq: honor already-setup queue merges""). Yet, the reverted commit was not the one introducing the bug. In fact, it actually triggered a UAF introduced by a different commit, and now fixed by commit d29bd41428cf ("block, bfq: reset last_bfqq_created on group change"). So, there is no point in keeping commit 2d52c58b9c9b ("block, bfq: honor already-setup queue merges") out. This commit restores it. [1] https://bugzilla.kernel.org/show_bug.cgi?id=214503

INFO

Published Date :

Feb. 26, 2025, 6:37 a.m.

Last Modified :

March 24, 2025, 5:46 p.m.

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67

Remotely Exploitable :

No

Impact Score :

5.9

Exploitability Score :

1.8
Affected Products

The following products are affected by CVE-2021-47646 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2021-47646 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2021-47646 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Mar. 24, 2025

    Action Type Old Value New Value
    Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to (excluding) 4.19.238 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 up to (excluding) 5.4.189 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.33 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.17 up to (excluding) 5.17.2 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.110 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 5.16.19
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/15729ff8143f8135b03988a100a19e66d7cb7ecd Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/4083925bd6dc89216d156474a8076feec904e607 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/65d8a737452e88f251fe5d925371de6d606df613 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/931aff627469a75c77b9fd3823146d0575afffd6 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/abc2129e646af7b43025d90a071f83043f1ae76c Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/cc051f497eac9d8a0d816cd4bffa3415f2724871 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/f990f0985eda59d4f29fc83fcf300c92b1225d39 Types: Patch
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Feb. 27, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    Added CWE CWE-416
  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Feb. 26, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: Revert "Revert "block, bfq: honor already-setup queue merges"" A crash [1] happened to be triggered in conjunction with commit 2d52c58b9c9b ("block, bfq: honor already-setup queue merges"). The latter was then reverted by commit ebc69e897e17 ("Revert "block, bfq: honor already-setup queue merges""). Yet, the reverted commit was not the one introducing the bug. In fact, it actually triggered a UAF introduced by a different commit, and now fixed by commit d29bd41428cf ("block, bfq: reset last_bfqq_created on group change"). So, there is no point in keeping commit 2d52c58b9c9b ("block, bfq: honor already-setup queue merges") out. This commit restores it. [1] https://bugzilla.kernel.org/show_bug.cgi?id=214503
    Added Reference https://git.kernel.org/stable/c/15729ff8143f8135b03988a100a19e66d7cb7ecd
    Added Reference https://git.kernel.org/stable/c/4083925bd6dc89216d156474a8076feec904e607
    Added Reference https://git.kernel.org/stable/c/65d8a737452e88f251fe5d925371de6d606df613
    Added Reference https://git.kernel.org/stable/c/931aff627469a75c77b9fd3823146d0575afffd6
    Added Reference https://git.kernel.org/stable/c/abc2129e646af7b43025d90a071f83043f1ae76c
    Added Reference https://git.kernel.org/stable/c/cc051f497eac9d8a0d816cd4bffa3415f2724871
    Added Reference https://git.kernel.org/stable/c/f990f0985eda59d4f29fc83fcf300c92b1225d39
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2021-47646 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2021-47646 weaknesses.

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
© cvefeed.io
Latest DB Update: Apr. 25, 2025 9:14