CVE-2021-47419: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_taprio: properly cancel timer from taprio_destroy() There is a comment in qdisc_create() about us not calling ops->reset() in some cases. err_out4: /* * Any broken qdiscs that would require a ops->reset() here? * The qdisc was never in action so it shouldn't be necessary. */ As taprio sets a timer before actually receiving a packet, we need to cancel it from ops->destroy, just in case ops->reset has not been called. syzbot reported: ODEBUG: free active (active state 0) object type: hrtimer hint: advance_sched+0x0/0x9a0 arch/x86/include/asm/atomic64_64.h:22 WARNING: CPU: 0 PID: 8441 at lib/debugobjects.c:505 debug_print_object+0x16e/0x250 lib/debugobjects.c:505 Modules linked in: CPU: 0 PID: 8441 Comm: syz-executor813 Not tainted 5.14.0-rc6-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:debug_print_object+0x16e/0x250 lib/debugobjects.c:505 Code: ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 af 00 00 00 48 8b 14 dd e0 d3 e3 89 4c 89 ee 48 c7 c7 e0 c7 e3 89 e8 5b 86 11 05 <0f> 0b 83 05 85 03 92 09 01 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e c3 RSP: 0018:ffffc9000130f330 EFLAGS: 00010282 RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 RDX: ffff88802baeb880 RSI: ffffffff815d87b5 RDI: fffff52000261e58 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 R10: ffffffff815d25ee R11: 0000000000000000 R12: ffffffff898dd020 R13: ffffffff89e3ce20 R14: ffffffff81653630 R15: dffffc0000000000 FS: 0000000000f0d300(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffb64b3e000 CR3: 0000000036557000 CR4: 00000000001506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __debug_check_no_obj_freed lib/debugobjects.c:987 [inline] debug_check_no_obj_freed+0x301/0x420 lib/debugobjects.c:1018 slab_free_hook mm/slub.c:1603 [inline] slab_free_freelist_hook+0x171/0x240 mm/slub.c:1653 slab_free mm/slub.c:3213 [inline] kfree+0xe4/0x540 mm/slub.c:4267 qdisc_create+0xbcf/0x1320 net/sched/sch_api.c:1299 tc_modify_qdisc+0x4c8/0x1a60 net/sched/sch_api.c:1663 rtnetlink_rcv_msg+0x413/0xb80 net/core/rtnetlink.c:5571 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2504 netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline] netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1340 netlink_sendmsg+0x86d/0xdb0 net/netlink/af_netlink.c:1929 sock_sendmsg_nosec net/socket.c:704 [inline] sock_sendmsg+0xcf/0x120 net/socket.c:724 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2403 ___sys_sendmsg+0xf3/0x170 net/socket.c:2457 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2486 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
AI Analysis
Technical Summary
CVE-2021-47419 is a medium-severity vulnerability in the Linux kernel's network scheduler subsystem, specifically within the taprio queuing discipline (qdisc) implementation. The issue arises from improper handling of timer cancellation in the taprio_destroy() function. The taprio qdisc sets a high-resolution timer before receiving packets, and if this timer is not properly cancelled during the destruction of the qdisc, it can lead to use-after-free or double-free conditions. The vulnerability was identified through syzbot, a kernel fuzzing tool, which detected a debug warning related to freeing an active hrtimer object. The root cause is that the ops->reset() callback is not always called, and thus the timer cancellation must be explicitly handled in ops->destroy to prevent kernel memory corruption. The vulnerability affects Linux kernel versions prior to the fix in the 5.14.0-rc6 development branch and potentially other versions using the affected commit hashes. The CVSS 3.1 score is 5.5 (medium), with the vector indicating local access (AV:L), low complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality or integrity impact (C:N/I:N), but causing high impact on availability (A:H). This means exploitation can cause denial of service (kernel crash or instability) but does not allow data leakage or privilege escalation. No known exploits are reported in the wild yet. The vulnerability is technical and requires local access and some privileges to trigger, limiting its exploitation scope but still posing a risk to systems running affected kernel versions, especially those using taprio qdisc for traffic scheduling.
Potential Impact
For European organizations, this vulnerability primarily poses a risk of denial of service on Linux systems running affected kernel versions with taprio qdisc enabled. This could impact servers, network appliances, or embedded devices that rely on Linux for traffic shaping or real-time packet scheduling. The denial of service could disrupt critical network functions, degrade service availability, or cause system crashes requiring reboots. Organizations with infrastructure using Linux kernels in the affected versions, especially in telecommunications, cloud providers, or data centers, may experience operational interruptions. Since the vulnerability requires local access and low privileges, insider threats or compromised accounts could exploit it to cause outages. However, there is no direct risk of data breach or privilege escalation. The impact is thus mainly on availability and operational continuity, which can have cascading effects on business processes and service delivery in sectors like finance, healthcare, and public services across Europe.
Mitigation Recommendations
1. Apply the official Linux kernel patches that address this vulnerability as soon as they are available and tested in your environment. Monitor kernel updates from trusted sources and vendors. 2. If immediate patching is not feasible, consider disabling or avoiding the use of the taprio qdisc in network configurations to eliminate the vulnerable code path. 3. Restrict local access to systems running affected kernels by enforcing strict access controls, limiting user privileges, and monitoring for suspicious activity. 4. Implement kernel hardening and exploit mitigation techniques such as Kernel Address Space Layout Randomization (KASLR) and Control Flow Integrity (CFI) where supported. 5. Regularly audit and monitor system logs for kernel warnings or crashes related to hrtimer or qdisc operations to detect potential exploitation attempts early. 6. For critical infrastructure, consider deploying intrusion detection systems capable of monitoring kernel-level anomalies. 7. Educate system administrators about this vulnerability and ensure they follow secure configuration and patch management best practices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2021-47419: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_taprio: properly cancel timer from taprio_destroy() There is a comment in qdisc_create() about us not calling ops->reset() in some cases. err_out4: /* * Any broken qdiscs that would require a ops->reset() here? * The qdisc was never in action so it shouldn't be necessary. */ As taprio sets a timer before actually receiving a packet, we need to cancel it from ops->destroy, just in case ops->reset has not been called. syzbot reported: ODEBUG: free active (active state 0) object type: hrtimer hint: advance_sched+0x0/0x9a0 arch/x86/include/asm/atomic64_64.h:22 WARNING: CPU: 0 PID: 8441 at lib/debugobjects.c:505 debug_print_object+0x16e/0x250 lib/debugobjects.c:505 Modules linked in: CPU: 0 PID: 8441 Comm: syz-executor813 Not tainted 5.14.0-rc6-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:debug_print_object+0x16e/0x250 lib/debugobjects.c:505 Code: ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 af 00 00 00 48 8b 14 dd e0 d3 e3 89 4c 89 ee 48 c7 c7 e0 c7 e3 89 e8 5b 86 11 05 <0f> 0b 83 05 85 03 92 09 01 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e c3 RSP: 0018:ffffc9000130f330 EFLAGS: 00010282 RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 RDX: ffff88802baeb880 RSI: ffffffff815d87b5 RDI: fffff52000261e58 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 R10: ffffffff815d25ee R11: 0000000000000000 R12: ffffffff898dd020 R13: ffffffff89e3ce20 R14: ffffffff81653630 R15: dffffc0000000000 FS: 0000000000f0d300(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffb64b3e000 CR3: 0000000036557000 CR4: 00000000001506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __debug_check_no_obj_freed lib/debugobjects.c:987 [inline] debug_check_no_obj_freed+0x301/0x420 lib/debugobjects.c:1018 slab_free_hook mm/slub.c:1603 [inline] slab_free_freelist_hook+0x171/0x240 mm/slub.c:1653 slab_free mm/slub.c:3213 [inline] kfree+0xe4/0x540 mm/slub.c:4267 qdisc_create+0xbcf/0x1320 net/sched/sch_api.c:1299 tc_modify_qdisc+0x4c8/0x1a60 net/sched/sch_api.c:1663 rtnetlink_rcv_msg+0x413/0xb80 net/core/rtnetlink.c:5571 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2504 netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline] netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1340 netlink_sendmsg+0x86d/0xdb0 net/netlink/af_netlink.c:1929 sock_sendmsg_nosec net/socket.c:704 [inline] sock_sendmsg+0xcf/0x120 net/socket.c:724 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2403 ___sys_sendmsg+0xf3/0x170 net/socket.c:2457 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2486 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
AI-Powered Analysis
Technical Analysis
CVE-2021-47419 is a medium-severity vulnerability in the Linux kernel's network scheduler subsystem, specifically within the taprio queuing discipline (qdisc) implementation. The issue arises from improper handling of timer cancellation in the taprio_destroy() function. The taprio qdisc sets a high-resolution timer before receiving packets, and if this timer is not properly cancelled during the destruction of the qdisc, it can lead to use-after-free or double-free conditions. The vulnerability was identified through syzbot, a kernel fuzzing tool, which detected a debug warning related to freeing an active hrtimer object. The root cause is that the ops->reset() callback is not always called, and thus the timer cancellation must be explicitly handled in ops->destroy to prevent kernel memory corruption. The vulnerability affects Linux kernel versions prior to the fix in the 5.14.0-rc6 development branch and potentially other versions using the affected commit hashes. The CVSS 3.1 score is 5.5 (medium), with the vector indicating local access (AV:L), low complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality or integrity impact (C:N/I:N), but causing high impact on availability (A:H). This means exploitation can cause denial of service (kernel crash or instability) but does not allow data leakage or privilege escalation. No known exploits are reported in the wild yet. The vulnerability is technical and requires local access and some privileges to trigger, limiting its exploitation scope but still posing a risk to systems running affected kernel versions, especially those using taprio qdisc for traffic scheduling.
Potential Impact
For European organizations, this vulnerability primarily poses a risk of denial of service on Linux systems running affected kernel versions with taprio qdisc enabled. This could impact servers, network appliances, or embedded devices that rely on Linux for traffic shaping or real-time packet scheduling. The denial of service could disrupt critical network functions, degrade service availability, or cause system crashes requiring reboots. Organizations with infrastructure using Linux kernels in the affected versions, especially in telecommunications, cloud providers, or data centers, may experience operational interruptions. Since the vulnerability requires local access and low privileges, insider threats or compromised accounts could exploit it to cause outages. However, there is no direct risk of data breach or privilege escalation. The impact is thus mainly on availability and operational continuity, which can have cascading effects on business processes and service delivery in sectors like finance, healthcare, and public services across Europe.
Mitigation Recommendations
1. Apply the official Linux kernel patches that address this vulnerability as soon as they are available and tested in your environment. Monitor kernel updates from trusted sources and vendors. 2. If immediate patching is not feasible, consider disabling or avoiding the use of the taprio qdisc in network configurations to eliminate the vulnerable code path. 3. Restrict local access to systems running affected kernels by enforcing strict access controls, limiting user privileges, and monitoring for suspicious activity. 4. Implement kernel hardening and exploit mitigation techniques such as Kernel Address Space Layout Randomization (KASLR) and Control Flow Integrity (CFI) where supported. 5. Regularly audit and monitor system logs for kernel warnings or crashes related to hrtimer or qdisc operations to detect potential exploitation attempts early. 6. For critical infrastructure, consider deploying intrusion detection systems capable of monitoring kernel-level anomalies. 7. Educate system administrators about this vulnerability and ensure they follow secure configuration and patch management best practices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-21T14:58:30.818Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9833c4522896dcbe90c5
Added to database: 5/21/2025, 9:09:07 AM
Last enriched: 6/30/2025, 12:41:38 PM
Last updated: 8/15/2025, 2:18:52 AM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.