Skip to main content

CVE-2021-47179: Vulnerability in Linux Linux

High
VulnerabilityCVE-2021-47179cvecve-2021-47179
Published: Mon Mar 25 2024 (03/25/2024, 09:16:28 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() Commit de144ff4234f changes _pnfs_return_layout() to call pnfs_mark_matching_lsegs_return() passing NULL as the struct pnfs_layout_range argument. Unfortunately, pnfs_mark_matching_lsegs_return() doesn't check if we have a value here before dereferencing it, causing an oops. I'm able to hit this crash consistently when running connectathon basic tests on NFS v4.1/v4.2 against Ontap.

AI-Powered Analysis

AILast updated: 06/28/2025, 04:56:27 UTC

Technical Analysis

CVE-2021-47179 is a vulnerability identified in the Linux kernel's implementation of NFSv4 (Network File System version 4). The issue arises from a NULL pointer dereference in the function pnfs_mark_matching_lsegs_return(). Specifically, a recent code change in the _pnfs_return_layout() function causes it to call pnfs_mark_matching_lsegs_return() with a NULL pointer for the struct pnfs_layout_range argument. The vulnerable function does not verify whether this pointer is NULL before dereferencing it, leading to a kernel oops (crash). This vulnerability can be triggered consistently during NFSv4.1 and v4.2 connectathon basic tests against certain storage systems such as Ontap. The root cause is a missing NULL check in the kernel code, which results in a denial of service condition due to kernel crash. The affected versions correspond to specific Linux kernel commits prior to the fix. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability affects Linux systems using NFSv4 with pNFS (parallel NFS) layout features enabled, which are common in enterprise and cloud environments for distributed file storage and access.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to environments that rely on Linux servers running NFSv4 with pNFS support, especially those using storage solutions like NetApp Ontap. Exploitation leads to a kernel crash, causing denial of service (DoS) on affected systems. This can disrupt critical file sharing and storage services, impacting business continuity, especially in sectors like finance, manufacturing, and public services that depend on reliable networked storage. Although the vulnerability does not appear to allow privilege escalation or remote code execution, the DoS impact can be severe in high-availability environments. Additionally, repeated crashes could lead to data availability issues and increased operational costs due to downtime and recovery efforts. The lack of known exploits reduces immediate risk, but the vulnerability's presence in widely used Linux kernels means European organizations must remain vigilant, particularly those with large-scale NFS deployments.

Mitigation Recommendations

Organizations should promptly apply the Linux kernel patches that address this NULL pointer dereference vulnerability. Since the issue stems from a specific commit, updating to the latest stable kernel versions that include the fix is critical. For environments where immediate patching is not feasible, administrators should consider disabling pNFS features or restricting NFSv4 access to trusted networks to reduce exposure. Monitoring kernel logs for oops or crash reports related to NFS operations can help detect attempted exploitation. Additionally, implementing robust network segmentation and access controls around NFS servers will limit potential attack vectors. Testing patches in staging environments before production deployment is recommended to ensure compatibility. Finally, maintaining up-to-date backups of critical data will mitigate the impact of potential service disruptions caused by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-03-25T09:12:14.112Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9822c4522896dcbde088

Added to database: 5/21/2025, 9:08:50 AM

Last enriched: 6/28/2025, 4:56:27 AM

Last updated: 7/26/2025, 6:40:13 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats