CVE-2021-47056: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init ADF_STATUS_PF_RUNNING is (only) used and checked by adf_vf2pf_shutdown() before calling adf_iov_putmsg()->mutex_lock(vf2pf_lock), however the vf2pf_lock is initialized in adf_dev_init(), which can fail and when it fail, the vf2pf_lock is either not initialized or destroyed, a subsequent use of vf2pf_lock will cause issue. To fix this issue, only set this flag if adf_dev_init() returns 0. [ 7.178404] BUG: KASAN: user-memory-access in __mutex_lock.isra.0+0x1ac/0x7c0 [ 7.180345] Call Trace: [ 7.182576] mutex_lock+0xc9/0xd0 [ 7.183257] adf_iov_putmsg+0x118/0x1a0 [intel_qat] [ 7.183541] adf_vf2pf_shutdown+0x4d/0x7b [intel_qat] [ 7.183834] adf_dev_shutdown+0x172/0x2b0 [intel_qat] [ 7.184127] adf_probe+0x5e9/0x600 [qat_dh895xccvf]
AI Analysis
Technical Summary
CVE-2021-47056 is a vulnerability identified in the Linux kernel specifically affecting the Intel QuickAssist Technology (QAT) driver component, which is responsible for hardware acceleration of cryptographic and compression operations. The flaw arises from improper handling of the initialization sequence in the qat driver, particularly in the function adf_dev_init(). The vulnerability occurs because the ADF_STATUS_PF_RUNNING flag is set unconditionally after calling adf_dev_init(), but if adf_dev_init() fails, the vf2pf_lock mutex is either not initialized or destroyed. Subsequent use of this mutex in adf_vf2pf_shutdown() leads to a use-after-free or invalid memory access condition, which can cause kernel crashes or undefined behavior. The kernel's KASAN (Kernel Address Sanitizer) detects this as a user-memory-access bug during mutex_lock operations. The root cause is a race or logic error where the driver assumes successful initialization before setting the running status flag, leading to unsafe locking operations on an uninitialized mutex. This vulnerability is present in specific Linux kernel versions identified by the commit hash 25c6ffb249f6..., affecting systems using the Intel QAT driver for cryptographic acceleration. Although no known exploits are reported in the wild, the flaw can cause denial of service (system crashes) or potentially be leveraged for privilege escalation if an attacker can trigger the faulty code path. The fix involves setting the ADF_STATUS_PF_RUNNING flag only if adf_dev_init() returns success, ensuring the mutex is valid before use.
Potential Impact
For European organizations, the impact of CVE-2021-47056 primarily involves potential denial of service conditions on Linux systems utilizing Intel QAT hardware acceleration. This is particularly relevant for enterprises and data centers relying on hardware-accelerated cryptographic operations for performance-sensitive applications such as VPN gateways, secure communications, and high-throughput encryption workloads. A successful exploitation could cause kernel panics or crashes, leading to service interruptions and potential data processing delays. Although no direct evidence of privilege escalation exploits exists, the vulnerability could be a stepping stone in complex attack chains targeting critical infrastructure or cloud environments. Organizations with Linux-based servers running Intel QAT drivers in financial services, telecommunications, or government sectors may face increased risk due to the strategic importance of secure and reliable cryptographic services. Additionally, disruption of cryptographic acceleration could degrade performance, impacting operational efficiency and compliance with data protection regulations such as GDPR if service availability is compromised.
Mitigation Recommendations
To mitigate CVE-2021-47056, European organizations should: 1) Apply the latest Linux kernel patches that address this vulnerability, ensuring the Intel QAT driver is updated to versions where the ADF_STATUS_PF_RUNNING flag is conditionally set only upon successful initialization. 2) Conduct thorough testing of kernel updates in staging environments to confirm stability and compatibility with existing cryptographic workloads. 3) Monitor kernel logs for signs of mutex_lock failures or KASAN warnings related to the qat driver, which may indicate attempted exploitation or instability. 4) Limit access to systems with Intel QAT hardware to trusted administrators and enforce strict privilege separation to reduce the risk of triggering the vulnerable code path. 5) Consider disabling Intel QAT acceleration temporarily if patching is not immediately feasible, especially in environments where availability is critical. 6) Implement comprehensive system monitoring and alerting to detect unusual kernel crashes or service disruptions that could be linked to this vulnerability. 7) Engage with hardware and Linux distribution vendors to receive timely updates and security advisories related to Intel QAT components.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2021-47056: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init ADF_STATUS_PF_RUNNING is (only) used and checked by adf_vf2pf_shutdown() before calling adf_iov_putmsg()->mutex_lock(vf2pf_lock), however the vf2pf_lock is initialized in adf_dev_init(), which can fail and when it fail, the vf2pf_lock is either not initialized or destroyed, a subsequent use of vf2pf_lock will cause issue. To fix this issue, only set this flag if adf_dev_init() returns 0. [ 7.178404] BUG: KASAN: user-memory-access in __mutex_lock.isra.0+0x1ac/0x7c0 [ 7.180345] Call Trace: [ 7.182576] mutex_lock+0xc9/0xd0 [ 7.183257] adf_iov_putmsg+0x118/0x1a0 [intel_qat] [ 7.183541] adf_vf2pf_shutdown+0x4d/0x7b [intel_qat] [ 7.183834] adf_dev_shutdown+0x172/0x2b0 [intel_qat] [ 7.184127] adf_probe+0x5e9/0x600 [qat_dh895xccvf]
AI-Powered Analysis
Technical Analysis
CVE-2021-47056 is a vulnerability identified in the Linux kernel specifically affecting the Intel QuickAssist Technology (QAT) driver component, which is responsible for hardware acceleration of cryptographic and compression operations. The flaw arises from improper handling of the initialization sequence in the qat driver, particularly in the function adf_dev_init(). The vulnerability occurs because the ADF_STATUS_PF_RUNNING flag is set unconditionally after calling adf_dev_init(), but if adf_dev_init() fails, the vf2pf_lock mutex is either not initialized or destroyed. Subsequent use of this mutex in adf_vf2pf_shutdown() leads to a use-after-free or invalid memory access condition, which can cause kernel crashes or undefined behavior. The kernel's KASAN (Kernel Address Sanitizer) detects this as a user-memory-access bug during mutex_lock operations. The root cause is a race or logic error where the driver assumes successful initialization before setting the running status flag, leading to unsafe locking operations on an uninitialized mutex. This vulnerability is present in specific Linux kernel versions identified by the commit hash 25c6ffb249f6..., affecting systems using the Intel QAT driver for cryptographic acceleration. Although no known exploits are reported in the wild, the flaw can cause denial of service (system crashes) or potentially be leveraged for privilege escalation if an attacker can trigger the faulty code path. The fix involves setting the ADF_STATUS_PF_RUNNING flag only if adf_dev_init() returns success, ensuring the mutex is valid before use.
Potential Impact
For European organizations, the impact of CVE-2021-47056 primarily involves potential denial of service conditions on Linux systems utilizing Intel QAT hardware acceleration. This is particularly relevant for enterprises and data centers relying on hardware-accelerated cryptographic operations for performance-sensitive applications such as VPN gateways, secure communications, and high-throughput encryption workloads. A successful exploitation could cause kernel panics or crashes, leading to service interruptions and potential data processing delays. Although no direct evidence of privilege escalation exploits exists, the vulnerability could be a stepping stone in complex attack chains targeting critical infrastructure or cloud environments. Organizations with Linux-based servers running Intel QAT drivers in financial services, telecommunications, or government sectors may face increased risk due to the strategic importance of secure and reliable cryptographic services. Additionally, disruption of cryptographic acceleration could degrade performance, impacting operational efficiency and compliance with data protection regulations such as GDPR if service availability is compromised.
Mitigation Recommendations
To mitigate CVE-2021-47056, European organizations should: 1) Apply the latest Linux kernel patches that address this vulnerability, ensuring the Intel QAT driver is updated to versions where the ADF_STATUS_PF_RUNNING flag is conditionally set only upon successful initialization. 2) Conduct thorough testing of kernel updates in staging environments to confirm stability and compatibility with existing cryptographic workloads. 3) Monitor kernel logs for signs of mutex_lock failures or KASAN warnings related to the qat driver, which may indicate attempted exploitation or instability. 4) Limit access to systems with Intel QAT hardware to trusted administrators and enforce strict privilege separation to reduce the risk of triggering the vulnerable code path. 5) Consider disabling Intel QAT acceleration temporarily if patching is not immediately feasible, especially in environments where availability is critical. 6) Implement comprehensive system monitoring and alerting to detect unusual kernel crashes or service disruptions that could be linked to this vulnerability. 7) Engage with hardware and Linux distribution vendors to receive timely updates and security advisories related to Intel QAT components.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-29T22:33:44.294Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9834c4522896dcbe9bd0
Added to database: 5/21/2025, 9:09:08 AM
Last enriched: 6/30/2025, 8:26:56 PM
Last updated: 8/17/2025, 8:48:12 PM
Views: 16
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.