CVE-2021-46956: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: virtiofs: fix memory leak in virtio_fs_probe() When accidentally passing twice the same tag to qemu, kmemleak ended up reporting a memory leak in virtiofs. Also, looking at the log I saw the following error (that's when I realised the duplicated tag): virtiofs: probe of virtio5 failed with error -17 Here's the kmemleak log for reference: unreferenced object 0xffff888103d47800 (size 1024): comm "systemd-udevd", pid 118, jiffies 4294893780 (age 18.340s) hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 80 90 02 a0 ff ff ff ff ................ backtrace: [<000000000ebb87c1>] virtio_fs_probe+0x171/0x7ae [virtiofs] [<00000000f8aca419>] virtio_dev_probe+0x15f/0x210 [<000000004d6baf3c>] really_probe+0xea/0x430 [<00000000a6ceeac8>] device_driver_attach+0xa8/0xb0 [<00000000196f47a7>] __driver_attach+0x98/0x140 [<000000000b20601d>] bus_for_each_dev+0x7b/0xc0 [<00000000399c7b7f>] bus_add_driver+0x11b/0x1f0 [<0000000032b09ba7>] driver_register+0x8f/0xe0 [<00000000cdd55998>] 0xffffffffa002c013 [<000000000ea196a2>] do_one_initcall+0x64/0x2e0 [<0000000008f727ce>] do_init_module+0x5c/0x260 [<000000003cdedab6>] __do_sys_finit_module+0xb5/0x120 [<00000000ad2f48c6>] do_syscall_64+0x33/0x40 [<00000000809526b5>] entry_SYSCALL_64_after_hwframe+0x44/0xae
AI Analysis
Technical Summary
CVE-2021-46956 is a vulnerability identified in the Linux kernel specifically related to the virtiofs component, which is used for sharing filesystems between host and guest in virtualized environments using QEMU. The vulnerability arises from a memory leak in the virtio_fs_probe() function when the same tag is accidentally passed twice to QEMU. This causes the kernel memory leak detector (kmemleak) to report unreferenced objects, indicating that allocated memory is not properly freed. The error logs show a failure in probing the virtio device with an error code -17, which corresponds to EEXIST (File exists), caused by the duplicated tag. The backtrace reveals that the issue occurs during device probing and driver attachment phases in the kernel initialization process. Although this vulnerability does not appear to allow direct code execution or privilege escalation, the memory leak could lead to resource exhaustion over time, potentially degrading system performance or causing denial of service in environments heavily relying on virtiofs for filesystem sharing. The vulnerability affects Linux kernel versions identified by the commit hash a62a8ef9d97da23762a588592c8b8eb50a8deb6a and was published on February 27, 2024. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, especially those utilizing Linux-based virtualization infrastructures with QEMU and virtiofs for efficient file sharing between host and guest systems, this vulnerability could lead to gradual memory leaks that degrade system stability and availability. Data confidentiality and integrity are unlikely to be directly impacted by this vulnerability since it does not enable arbitrary code execution or privilege escalation. However, the memory leak could cause denial of service conditions by exhausting kernel memory resources, particularly in large-scale virtualized environments such as cloud service providers, data centers, and enterprises running containerized or virtualized workloads. This could result in downtime or degraded performance of critical services. Organizations relying on Linux virtualization for critical infrastructure or sensitive workloads should consider this vulnerability a risk to operational continuity. Given the absence of known exploits, the immediate risk is moderate, but unpatched systems remain vulnerable to potential future exploitation or accidental system failures.
Mitigation Recommendations
1. Apply the official Linux kernel patches that address this memory leak in the virtiofs component as soon as they become available. Monitor Linux kernel mailing lists and vendor advisories for updates. 2. Review and audit QEMU configurations to ensure that unique tags are used for virtiofs mounts to prevent accidental duplication, which triggers the memory leak. 3. Implement monitoring of kernel memory usage and kmemleak logs in virtualized hosts to detect early signs of memory leaks related to virtiofs. 4. For environments where patching is delayed, consider disabling virtiofs if it is not critical to operations or replacing it with alternative file sharing mechanisms temporarily. 5. Conduct regular system and kernel updates as part of a robust patch management program to minimize exposure to known vulnerabilities. 6. Engage with Linux distribution vendors for backported patches if using long-term support kernels to ensure timely remediation without full kernel upgrades.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2021-46956: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: virtiofs: fix memory leak in virtio_fs_probe() When accidentally passing twice the same tag to qemu, kmemleak ended up reporting a memory leak in virtiofs. Also, looking at the log I saw the following error (that's when I realised the duplicated tag): virtiofs: probe of virtio5 failed with error -17 Here's the kmemleak log for reference: unreferenced object 0xffff888103d47800 (size 1024): comm "systemd-udevd", pid 118, jiffies 4294893780 (age 18.340s) hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 80 90 02 a0 ff ff ff ff ................ backtrace: [<000000000ebb87c1>] virtio_fs_probe+0x171/0x7ae [virtiofs] [<00000000f8aca419>] virtio_dev_probe+0x15f/0x210 [<000000004d6baf3c>] really_probe+0xea/0x430 [<00000000a6ceeac8>] device_driver_attach+0xa8/0xb0 [<00000000196f47a7>] __driver_attach+0x98/0x140 [<000000000b20601d>] bus_for_each_dev+0x7b/0xc0 [<00000000399c7b7f>] bus_add_driver+0x11b/0x1f0 [<0000000032b09ba7>] driver_register+0x8f/0xe0 [<00000000cdd55998>] 0xffffffffa002c013 [<000000000ea196a2>] do_one_initcall+0x64/0x2e0 [<0000000008f727ce>] do_init_module+0x5c/0x260 [<000000003cdedab6>] __do_sys_finit_module+0xb5/0x120 [<00000000ad2f48c6>] do_syscall_64+0x33/0x40 [<00000000809526b5>] entry_SYSCALL_64_after_hwframe+0x44/0xae
AI-Powered Analysis
Technical Analysis
CVE-2021-46956 is a vulnerability identified in the Linux kernel specifically related to the virtiofs component, which is used for sharing filesystems between host and guest in virtualized environments using QEMU. The vulnerability arises from a memory leak in the virtio_fs_probe() function when the same tag is accidentally passed twice to QEMU. This causes the kernel memory leak detector (kmemleak) to report unreferenced objects, indicating that allocated memory is not properly freed. The error logs show a failure in probing the virtio device with an error code -17, which corresponds to EEXIST (File exists), caused by the duplicated tag. The backtrace reveals that the issue occurs during device probing and driver attachment phases in the kernel initialization process. Although this vulnerability does not appear to allow direct code execution or privilege escalation, the memory leak could lead to resource exhaustion over time, potentially degrading system performance or causing denial of service in environments heavily relying on virtiofs for filesystem sharing. The vulnerability affects Linux kernel versions identified by the commit hash a62a8ef9d97da23762a588592c8b8eb50a8deb6a and was published on February 27, 2024. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, especially those utilizing Linux-based virtualization infrastructures with QEMU and virtiofs for efficient file sharing between host and guest systems, this vulnerability could lead to gradual memory leaks that degrade system stability and availability. Data confidentiality and integrity are unlikely to be directly impacted by this vulnerability since it does not enable arbitrary code execution or privilege escalation. However, the memory leak could cause denial of service conditions by exhausting kernel memory resources, particularly in large-scale virtualized environments such as cloud service providers, data centers, and enterprises running containerized or virtualized workloads. This could result in downtime or degraded performance of critical services. Organizations relying on Linux virtualization for critical infrastructure or sensitive workloads should consider this vulnerability a risk to operational continuity. Given the absence of known exploits, the immediate risk is moderate, but unpatched systems remain vulnerable to potential future exploitation or accidental system failures.
Mitigation Recommendations
1. Apply the official Linux kernel patches that address this memory leak in the virtiofs component as soon as they become available. Monitor Linux kernel mailing lists and vendor advisories for updates. 2. Review and audit QEMU configurations to ensure that unique tags are used for virtiofs mounts to prevent accidental duplication, which triggers the memory leak. 3. Implement monitoring of kernel memory usage and kmemleak logs in virtualized hosts to detect early signs of memory leaks related to virtiofs. 4. For environments where patching is delayed, consider disabling virtiofs if it is not critical to operations or replacing it with alternative file sharing mechanisms temporarily. 5. Conduct regular system and kernel updates as part of a robust patch management program to minimize exposure to known vulnerabilities. 6. Engage with Linux distribution vendors for backported patches if using long-term support kernels to ensure timely remediation without full kernel upgrades.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-27T18:42:55.937Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9834c4522896dcbe98c3
Added to database: 5/21/2025, 9:09:08 AM
Last enriched: 6/30/2025, 5:58:18 PM
Last updated: 7/26/2025, 8:31:22 PM
Views: 11
Related Threats
CVE-2025-8834: Cross Site Scripting in JCG Link-net LW-N915R
MediumCVE-2025-55159: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in tokio-rs slab
MediumCVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.