CVE-2021-41073
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2021-41073 is a vulnerability discovered in the Linux kernel's io_uring subsystem, specifically in the loop_rw_iter function in fs/io_uring.c. The vulnerability affects Linux kernel versions 5.10 through 5.14.6, discovered and reported by Valentina Palmiotti in September 2021. The flaw allows local users to gain elevated privileges by using IORING_OP_PROVIDE_BUFFERS to trigger a free of a kernel buffer (Openwall List).

Technical details

The vulnerability exists in the loop_rw_iter function within fs/io_uring.c. When files don't implement the file op function read_iter (such as procfs files like /proc//maps), loop_rw_iter is called to manually perform iterative read/write operations. The issue occurs when using IORING_OP_PROVIDE_BUFFERS command to preselect buffers for I/O operations, causing req->rw.addr to contain a pointer to a kernel buffer (io_buffer structure) instead of a userspace buffer. This buffer is later freed in io_put_kbuf after the read/write request completes, giving attackers the ability to free adjacent buffers at a controllable offset (Openwall List).

Impact

The vulnerability has a CVSS 3.1 score of 7.8 (High), allowing local users with normal privileges to escalate to higher privileges. Successful exploitation could lead to disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS) (NetApp Advisory).

Mitigation and workarounds

The vulnerability was patched in the Linux kernel with commit 16c8d2df7ec0eed31b7d3b61cb13206a7fb930cc, which ensures symmetry in handling iter types in loop_rw_iter(). The fix has been backported to affected stable kernel trees. Various Linux distributions have released security updates to address this vulnerability, including Debian (version 5.10.46-5) and Fedora (Kernel Commit, Debian Advisory).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68764N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-modules
NoYesJan 05, 2026
CVE-2025-68762N/AN/A
  • Linux KernelLinux Kernel
  • kernel-debug
NoYesJan 05, 2026
CVE-2025-68758N/AN/A
  • Linux KernelLinux Kernel
  • linux-riscv
NoYesJan 05, 2026
CVE-2025-68756N/AN/A
  • Linux KernelLinux Kernel
  • linux-fips
NoYesJan 05, 2026
CVE-2025-68753N/AN/A
  • Linux KernelLinux Kernel
  • python3-perf
NoYesJan 05, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management