Skip to main content

CVE-2021-47186: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47186cvecve-2021-47186
Published: Wed Apr 10 2024 (04/10/2024, 18:56:26 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: tipc: check for null after calling kmemdup kmemdup can return a null pointer so need to check for it, otherwise the null key will be dereferenced later in tipc_crypto_key_xmit as can be seen in the trace [1]. [1] https://syzkaller.appspot.com/bug?id=bca180abb29567b189efdbdb34cbf7ba851c2a58

AI-Powered Analysis

AILast updated: 07/04/2025, 11:25:43 UTC

Technical Analysis

CVE-2021-47186 is a vulnerability identified in the Linux kernel specifically within the Transparent Inter-Process Communication (TIPC) subsystem. The issue arises because the kernel code fails to check the return value of the kmemdup function for a null pointer before dereferencing it in the tipc_crypto_key_xmit function. The kmemdup function is used to duplicate memory, and it can return a null pointer if memory allocation fails. Without this null check, the kernel attempts to dereference a null pointer, which can lead to a kernel crash (denial of service) or potentially enable further exploitation depending on the context. This vulnerability was discovered through fuzz testing (as referenced by the syzkaller bug report) and has been addressed by adding the necessary null pointer check to prevent the dereference. The vulnerability affects specific Linux kernel commits identified by the hash 1ef6f7c9390ff5308c940ff8d0a53533a4673ad9, indicating it is present in certain kernel versions prior to the patch. No known exploits are reported in the wild at this time, and no CVSS score has been assigned yet. The vulnerability is categorized as a kernel-level memory safety issue that can impact system stability and security.

Potential Impact

For European organizations, the impact of CVE-2021-47186 primarily involves potential denial of service conditions on Linux systems running vulnerable kernel versions. Since Linux is widely used in servers, cloud infrastructure, and embedded systems across Europe, exploitation could disrupt critical services, especially in sectors relying on high availability such as finance, telecommunications, healthcare, and government. Although no active exploits are known, the vulnerability could be leveraged by local attackers or malicious insiders to cause system crashes or potentially escalate privileges if combined with other vulnerabilities. The integrity and availability of affected systems could be compromised, leading to operational disruptions and potential data loss. Confidentiality impact is limited unless further exploitation chains are developed. Organizations using Linux kernels with the vulnerable TIPC subsystem enabled should be particularly vigilant, as TIPC is used in clustered and telecom environments, which are common in European industrial and telecom infrastructures.

Mitigation Recommendations

European organizations should immediately verify if their Linux systems are running kernel versions containing the vulnerable commit (1ef6f7c9390ff5308c940ff8d0a53533a4673ad9) or earlier. They should apply the latest Linux kernel patches that include the fix for CVE-2021-47186. For systems where immediate patching is not feasible, disabling the TIPC subsystem if it is not required can mitigate exposure. Additionally, organizations should implement strict access controls to limit who can execute code or interact with kernel subsystems, reducing the risk of exploitation. Monitoring kernel logs for unusual crashes or memory allocation failures related to TIPC can help detect attempted exploitation. Incorporating this vulnerability into vulnerability management and incident response workflows will ensure timely detection and remediation. Finally, organizations should maintain up-to-date backups and test recovery procedures to minimize impact from potential denial of service incidents.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-03-25T09:12:14.113Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeb02d

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/4/2025, 11:25:43 AM

Last updated: 8/14/2025, 4:41:21 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats