Skip to main content

CVE-2021-47143: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47143cvecve-2021-47143
Published: Mon Mar 25 2024 (03/25/2024, 09:07:41 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net/smc: remove device from smcd_dev_list after failed device_add() If the device_add() for a smcd_dev fails, there's no cleanup step that rolls back the earlier list_add(). The device subsequently gets freed, and we end up with a corrupted list. Add some error handling that removes the device from the list.

AI-Powered Analysis

AILast updated: 06/26/2025, 19:36:08 UTC

Technical Analysis

CVE-2021-47143 is a vulnerability identified in the Linux kernel's handling of the SMC-D (Shared Memory Communications over RDMA) device list management. Specifically, the issue arises in the net/smc subsystem where, if the device_add() function call for an smcd_dev (SMC-D device) fails, there is no corresponding cleanup to remove the device from the smcd_dev_list. This results in a stale or corrupted linked list entry because the device is freed without being removed from the list, leading to potential list corruption. Such corruption can cause undefined behavior in the kernel, including possible memory corruption, kernel crashes (denial of service), or other stability issues. The vulnerability stems from improper error handling and resource management during device initialization. The patch involves adding error handling code to ensure that if device_add() fails, the device is properly removed from the list to maintain list integrity. Although no known exploits are reported in the wild, the flaw could be leveraged by a local attacker or malicious process with the ability to trigger device initialization failures, potentially leading to kernel instability or denial of service conditions.

Potential Impact

For European organizations, this vulnerability primarily threatens the stability and reliability of Linux-based systems, which are widely used in enterprise servers, cloud infrastructure, and embedded devices. A successful exploitation could cause kernel crashes or system reboots, leading to service disruptions and potential data loss. Critical infrastructure providers, financial institutions, and cloud service providers relying on Linux kernels with the vulnerable SMC-D subsystem could experience operational downtime. While the vulnerability does not directly expose data confidentiality or integrity breaches, the resulting denial of service could impact availability of critical services. Additionally, organizations with stringent uptime requirements or those operating in regulated sectors (e.g., healthcare, finance) may face compliance and reputational risks if systems are affected. Since no public exploits are known, the immediate risk is moderate, but the vulnerability should be addressed promptly to prevent future exploitation as attackers often develop exploits for such kernel-level bugs.

Mitigation Recommendations

European organizations should prioritize applying the official Linux kernel patches that address CVE-2021-47143 as soon as they become available from their Linux distribution vendors. Given the kernel-level nature of the vulnerability, updating the kernel to a patched version is the most effective mitigation. Organizations should also audit their systems to identify any use of the SMC-D subsystem and assess exposure. For environments where immediate patching is not feasible, consider disabling the SMC-D feature if not required, to reduce attack surface. Monitoring kernel logs for unusual device initialization errors or crashes related to net/smc may help detect attempts to trigger this vulnerability. Additionally, enforcing strict access controls to limit which users or processes can manipulate kernel devices reduces the risk of exploitation. Regularly updating and testing kernel updates in staging environments before production deployment will ensure stability and security.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-03-04T18:12:48.844Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9834c4522896dcbe9e80

Added to database: 5/21/2025, 9:09:08 AM

Last enriched: 6/26/2025, 7:36:08 PM

Last updated: 8/12/2025, 2:43:51 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats