CVE-2021-47276: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ftrace: Do not blindly read the ip address in ftrace_bug() It was reported that a bug on arm64 caused a bad ip address to be used for updating into a nop in ftrace_init(), but the error path (rightfully) returned -EINVAL and not -EFAULT, as the bug caused more than one error to occur. But because -EINVAL was returned, the ftrace_bug() tried to report what was at the location of the ip address, and read it directly. This caused the machine to panic, as the ip was not pointing to a valid memory address. Instead, read the ip address with copy_from_kernel_nofault() to safely access the memory, and if it faults, report that the address faulted, otherwise report what was in that location.
AI Analysis
Technical Summary
CVE-2021-47276 is a vulnerability identified in the Linux kernel specifically affecting the ftrace subsystem on the arm64 architecture. The issue arises from improper handling of instruction pointer (ip) addresses within the ftrace_bug() function. When a bug in ftrace_init() attempts to update instructions to no-operations (nop), an error path returns -EINVAL instead of -EFAULT. This causes ftrace_bug() to blindly read the ip address without verifying its validity. If the ip address points to an invalid memory location, this results in a kernel panic due to an unsafe memory access. The vulnerability is rooted in the kernel's failure to safely access the ip address, which can lead to system crashes. The fix involves using copy_from_kernel_nofault() to safely read the ip address, which prevents faults by handling invalid memory access gracefully and reporting faults instead of causing a panic. This vulnerability is specific to arm64 Linux kernel versions identified by the commit hash 05736a427f7e16be948ccbf39782bd3a6ae16b14 and was published on May 21, 2024. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.
Potential Impact
For European organizations running Linux on arm64 architectures, this vulnerability could lead to unexpected system crashes (kernel panics) when the ftrace subsystem encounters this specific error condition. This impacts system availability, potentially causing downtime for critical services relying on affected Linux kernels. While the vulnerability does not appear to allow privilege escalation or code execution, the denial of service caused by kernel panics can disrupt operations, especially in environments where arm64 Linux servers are used for cloud infrastructure, edge computing, or embedded systems. Organizations with high availability requirements or those operating critical infrastructure could face operational interruptions. Since no known exploits exist, the immediate risk is moderate, but unpatched systems remain vulnerable to accidental or targeted triggering of this bug, which could be leveraged in denial-of-service attacks.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the patch for CVE-2021-47276. Specifically, kernel versions incorporating the fix that replaces direct ip address reads with copy_from_kernel_nofault() should be deployed. For environments where immediate patching is not feasible, organizations should monitor kernel logs for ftrace-related errors and consider disabling ftrace functionality if it is not essential, as a temporary mitigation. Additionally, implementing robust system monitoring and automated reboot mechanisms can help reduce downtime caused by unexpected panics. Organizations should also ensure that their incident response and business continuity plans account for potential kernel panics in arm64 Linux systems. Finally, maintaining strict control over kernel module loading and limiting access to kernel debugging features can reduce the risk of exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Norway, Denmark
CVE-2021-47276: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ftrace: Do not blindly read the ip address in ftrace_bug() It was reported that a bug on arm64 caused a bad ip address to be used for updating into a nop in ftrace_init(), but the error path (rightfully) returned -EINVAL and not -EFAULT, as the bug caused more than one error to occur. But because -EINVAL was returned, the ftrace_bug() tried to report what was at the location of the ip address, and read it directly. This caused the machine to panic, as the ip was not pointing to a valid memory address. Instead, read the ip address with copy_from_kernel_nofault() to safely access the memory, and if it faults, report that the address faulted, otherwise report what was in that location.
AI-Powered Analysis
Technical Analysis
CVE-2021-47276 is a vulnerability identified in the Linux kernel specifically affecting the ftrace subsystem on the arm64 architecture. The issue arises from improper handling of instruction pointer (ip) addresses within the ftrace_bug() function. When a bug in ftrace_init() attempts to update instructions to no-operations (nop), an error path returns -EINVAL instead of -EFAULT. This causes ftrace_bug() to blindly read the ip address without verifying its validity. If the ip address points to an invalid memory location, this results in a kernel panic due to an unsafe memory access. The vulnerability is rooted in the kernel's failure to safely access the ip address, which can lead to system crashes. The fix involves using copy_from_kernel_nofault() to safely read the ip address, which prevents faults by handling invalid memory access gracefully and reporting faults instead of causing a panic. This vulnerability is specific to arm64 Linux kernel versions identified by the commit hash 05736a427f7e16be948ccbf39782bd3a6ae16b14 and was published on May 21, 2024. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.
Potential Impact
For European organizations running Linux on arm64 architectures, this vulnerability could lead to unexpected system crashes (kernel panics) when the ftrace subsystem encounters this specific error condition. This impacts system availability, potentially causing downtime for critical services relying on affected Linux kernels. While the vulnerability does not appear to allow privilege escalation or code execution, the denial of service caused by kernel panics can disrupt operations, especially in environments where arm64 Linux servers are used for cloud infrastructure, edge computing, or embedded systems. Organizations with high availability requirements or those operating critical infrastructure could face operational interruptions. Since no known exploits exist, the immediate risk is moderate, but unpatched systems remain vulnerable to accidental or targeted triggering of this bug, which could be leveraged in denial-of-service attacks.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the patch for CVE-2021-47276. Specifically, kernel versions incorporating the fix that replaces direct ip address reads with copy_from_kernel_nofault() should be deployed. For environments where immediate patching is not feasible, organizations should monitor kernel logs for ftrace-related errors and consider disabling ftrace functionality if it is not essential, as a temporary mitigation. Additionally, implementing robust system monitoring and automated reboot mechanisms can help reduce downtime caused by unexpected panics. Organizations should also ensure that their incident response and business continuity plans account for potential kernel panics in arm64 Linux systems. Finally, maintaining strict control over kernel module loading and limiting access to kernel debugging features can reduce the risk of exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-21T13:27:52.128Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9835c4522896dcbea2a9
Added to database: 5/21/2025, 9:09:09 AM
Last enriched: 6/26/2025, 11:35:26 AM
Last updated: 8/19/2025, 1:07:40 PM
Views: 15
Related Threats
CVE-2025-9169: Cross Site Scripting in SolidInvoice
MediumCVE-2025-9168: Cross Site Scripting in SolidInvoice
MediumCVE-2025-8364: Address bar spoofing using an blob URI on Firefox for Android in Mozilla Firefox
HighCVE-2025-8042: Sandboxed iframe could start downloads in Mozilla Firefox
HighCVE-2025-8041: Incorrect URL truncation in Firefox for Android in Mozilla Firefox
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.