Skip to main content

CVE-2021-47283: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47283cvecve-2021-47283
Published: Tue May 21 2024 (05/21/2024, 14:20:08 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net:sfc: fix non-freed irq in legacy irq mode SFC driver can be configured via modparam to work using MSI-X, MSI or legacy IRQ interrupts. In the last one, the interrupt was not properly released on module remove. It was not freed because the flag irqs_hooked was not set during initialization in the case of using legacy IRQ. Example of (trimmed) trace during module remove without this fix: remove_proc_entry: removing non-empty directory 'irq/125', leaking at least '0000:3b:00.1' WARNING: CPU: 39 PID: 3658 at fs/proc/generic.c:715 remove_proc_entry+0x15c/0x170 ...trimmed... Call Trace: unregister_irq_proc+0xe3/0x100 free_desc+0x29/0x70 irq_free_descs+0x47/0x70 mp_unmap_irq+0x58/0x60 acpi_unregister_gsi_ioapic+0x2a/0x40 acpi_pci_irq_disable+0x78/0xb0 pci_disable_device+0xd1/0x100 efx_pci_remove+0xa1/0x1e0 [sfc] pci_device_remove+0x38/0xa0 __device_release_driver+0x177/0x230 driver_detach+0xcb/0x110 bus_remove_driver+0x58/0xd0 pci_unregister_driver+0x2a/0xb0 efx_exit_module+0x24/0xf40 [sfc] __do_sys_delete_module.constprop.0+0x171/0x280 ? exit_to_user_mode_prepare+0x83/0x1d0 do_syscall_64+0x3d/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f9f9385800b ...trimmed...

AI-Powered Analysis

AILast updated: 06/26/2025, 11:22:45 UTC

Technical Analysis

CVE-2021-47283 is a vulnerability identified in the Linux kernel's Solarflare (SFC) network driver, specifically related to the handling of legacy IRQ (Interrupt Request) mode. The SFC driver supports multiple interrupt modes including MSI-X, MSI, and legacy IRQ. The vulnerability arises because, when configured to use legacy IRQ mode, the driver fails to properly release the interrupt during module removal. This occurs due to the 'irqs_hooked' flag not being set during initialization in legacy IRQ mode, which leads to the interrupt not being freed when the module is unloaded. The technical consequence is a resource leak where the IRQ remains allocated, causing kernel warnings and potential instability. The provided kernel trace shows warnings related to non-empty proc directories and failed IRQ release calls during module removal. Although this vulnerability does not directly allow code execution or privilege escalation, the improper release of IRQs can lead to resource exhaustion, degraded system stability, or denial of service conditions on affected systems. The issue is specific to the SFC driver and affects Linux kernel versions containing the vulnerable code. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The vulnerability was published on May 21, 2024, and has been addressed by fixing the IRQ release logic in the driver code to ensure the 'irqs_hooked' flag is correctly set and interrupts are freed properly during module removal.

Potential Impact

For European organizations, the impact of CVE-2021-47283 is primarily related to system stability and availability rather than direct compromise of confidentiality or integrity. Organizations running Linux systems with Solarflare network adapters using legacy IRQ mode are at risk of resource leaks that could degrade network performance or cause kernel warnings and potential crashes during driver unload operations. This could affect data centers, cloud providers, and enterprises relying on high-performance networking hardware for critical infrastructure. In environments where network drivers are frequently reloaded or updated, the risk of system instability increases. Although no active exploitation is known, the vulnerability could be leveraged in targeted denial-of-service scenarios, impacting availability of network services. European organizations with high reliance on Linux-based infrastructure and Solarflare hardware, especially in sectors like telecommunications, finance, and cloud services, should be aware of this risk. The vulnerability does not appear to expose systems to remote code execution or privilege escalation, limiting its impact to local system reliability and resource management.

Mitigation Recommendations

To mitigate CVE-2021-47283, European organizations should: 1) Apply the latest Linux kernel updates that include the fix for the SFC driver IRQ release issue. Ensure that kernel versions are updated to those containing the corrected driver code where the 'irqs_hooked' flag is properly set in legacy IRQ mode. 2) Audit systems using Solarflare network adapters to determine if legacy IRQ mode is in use; if possible, reconfigure the driver to use MSI or MSI-X interrupt modes, which are not affected by this issue and generally provide better performance and stability. 3) Implement monitoring for kernel warnings related to IRQ handling and driver unload operations to detect potential resource leaks early. 4) In environments where driver reloads are frequent, schedule maintenance windows to minimize impact and ensure proper driver lifecycle management. 5) Engage with hardware vendors and Linux distribution maintainers to confirm that patched kernel versions are deployed promptly. 6) For critical systems, consider isolating or limiting the use of legacy IRQ mode until patches are applied. These steps go beyond generic advice by focusing on driver configuration, proactive monitoring, and targeted patch management specific to the affected hardware and driver.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-21T13:27:52.129Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9835c4522896dcbea2e9

Added to database: 5/21/2025, 9:09:09 AM

Last enriched: 6/26/2025, 11:22:45 AM

Last updated: 7/25/2025, 11:43:53 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats