
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-47640 affects the Linux kernel's PowerPC KASAN (Kernel Address Sanitizer) implementation. The vulnerability was discovered when the shadow's page table was not being updated correctly when PTE_RPN_SHIFT is 24 and PAGE_SHIFT is 12. This issue was disclosed on February 26, 2025, and affects the PowerPC architecture specifically (NVD).
The vulnerability exists in the PowerPC KASAN implementation where the shadow's page table update mechanism fails under specific conditions. The issue manifests when PTE_RPN_SHIFT is 24 and PAGE_SHIFT is 12, causing both false positives and false negatives in KASAN memory access detection. The bug specifically affects the kasan_update_early_region function in the PowerPC architecture code (Kernel Patch).
The vulnerability results in KASAN reporting false positives for out-of-bounds memory access and failing to detect actual memory violations (false negatives). This affects the kernel's ability to properly detect memory-related bugs and security issues, particularly in the vmalloc-out-of-bounds detection functionality (RedHat).
The issue has been fixed by modifying the logic of kasan_early_shadow_page_entry in the kernel code. The fix involves updating the page table check mechanism to use pte_page() instead of directly comparing physical addresses. Multiple Linux distributions have released patches, including Ubuntu and Debian, with fixed versions available for affected systems (Ubuntu, Debian).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."