CVE-2021-47424: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: i40e: Fix freeing of uninitialized misc IRQ vector When VSI set up failed in i40e_probe() as part of PF switch set up driver was trying to free misc IRQ vectors in i40e_clear_interrupt_scheme and produced a kernel Oops: Trying to free already-free IRQ 266 WARNING: CPU: 0 PID: 5 at kernel/irq/manage.c:1731 __free_irq+0x9a/0x300 Workqueue: events work_for_cpu_fn RIP: 0010:__free_irq+0x9a/0x300 Call Trace: ? synchronize_irq+0x3a/0xa0 free_irq+0x2e/0x60 i40e_clear_interrupt_scheme+0x53/0x190 [i40e] i40e_probe.part.108+0x134b/0x1a40 [i40e] ? kmem_cache_alloc+0x158/0x1c0 ? acpi_ut_update_ref_count.part.1+0x8e/0x345 ? acpi_ut_update_object_reference+0x15e/0x1e2 ? strstr+0x21/0x70 ? irq_get_irq_data+0xa/0x20 ? mp_check_pin_attr+0x13/0xc0 ? irq_get_irq_data+0xa/0x20 ? mp_map_pin_to_irq+0xd3/0x2f0 ? acpi_register_gsi_ioapic+0x93/0x170 ? pci_conf1_read+0xa4/0x100 ? pci_bus_read_config_word+0x49/0x70 ? do_pci_enable_device+0xcc/0x100 local_pci_probe+0x41/0x90 work_for_cpu_fn+0x16/0x20 process_one_work+0x1a7/0x360 worker_thread+0x1cf/0x390 ? create_worker+0x1a0/0x1a0 kthread+0x112/0x130 ? kthread_flush_work_fn+0x10/0x10 ret_from_fork+0x1f/0x40 The problem is that at that point misc IRQ vectors were not allocated yet and we get a call trace that driver is trying to free already free IRQ vectors. Add a check in i40e_clear_interrupt_scheme for __I40E_MISC_IRQ_REQUESTED PF state before calling i40e_free_misc_vector. This state is set only if misc IRQ vectors were properly initialized.
AI Analysis
Technical Summary
CVE-2021-47424 is a vulnerability in the Linux kernel specifically affecting the i40e network driver, which is used for Intel Ethernet devices. The issue arises during the initialization and setup of the Virtual Station Interface (VSI) in the i40e_probe() function, part of the Physical Function (PF) switch setup process. When VSI setup fails, the driver attempts to free miscellaneous IRQ (Interrupt Request) vectors that were never properly allocated. This results in a kernel Oops, a critical error that causes the kernel to crash or become unstable. The root cause is that the driver calls i40e_clear_interrupt_scheme(), which in turn calls free_irq() on IRQ vectors that are already freed or never allocated, leading to a double-free or invalid free operation. The patch for this vulnerability adds a check for the PF state flag __I40E_MISC_IRQ_REQUESTED before attempting to free the IRQ vectors, ensuring that the driver only frees IRQs that were successfully allocated. This vulnerability can cause system instability or denial of service (DoS) due to kernel crashes when the affected driver encounters certain error conditions during device initialization or reconfiguration. Since this is a kernel-level issue affecting a network driver, it impacts systems running Linux kernels with the vulnerable i40e driver version, particularly those using Intel Ethernet hardware supported by this driver. There is no indication of known exploits in the wild, and no CVSS score has been assigned yet. The vulnerability requires no user interaction but does require the presence of the affected hardware and driver, and it can be triggered during device initialization or reconfiguration failures.
Potential Impact
For European organizations, the impact of CVE-2021-47424 can be significant in environments relying on Intel Ethernet devices supported by the i40e driver, especially in data centers, cloud infrastructure, and enterprise networks running Linux-based systems. The vulnerability can lead to kernel crashes and system instability, resulting in denial of service conditions that disrupt network connectivity and critical services. This can affect availability of networked applications, virtualized environments, and storage systems that depend on stable network interfaces. Organizations with high network throughput demands or those using advanced network virtualization features may experience increased risk. Additionally, repeated kernel crashes could lead to data loss or corruption in sensitive environments. Although no known exploits exist, the vulnerability's presence in the kernel means that attackers with local access or the ability to trigger device reinitialization could potentially cause service disruptions. This is particularly relevant for managed service providers, telecom operators, and enterprises with large Linux server deployments across Europe.
Mitigation Recommendations
To mitigate CVE-2021-47424, European organizations should prioritize updating their Linux kernel to the latest patched version that includes the fix for this vulnerability. Specifically, ensure that the i40e driver version in use contains the check for __I40E_MISC_IRQ_REQUESTED before freeing IRQ vectors. System administrators should audit their environments to identify servers and devices using Intel Ethernet hardware supported by the i40e driver. For critical systems, consider implementing kernel live patching solutions to apply fixes without downtime. Additionally, monitoring kernel logs for Oops messages related to free_irq or i40e driver errors can help detect attempts to trigger this vulnerability. Network device firmware and driver updates from hardware vendors should also be applied as part of a comprehensive patch management strategy. In environments where immediate patching is not feasible, isolating affected systems or limiting access to local users can reduce the risk of exploitation. Finally, incorporating this vulnerability into incident response and vulnerability management workflows will ensure timely detection and remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2021-47424: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: i40e: Fix freeing of uninitialized misc IRQ vector When VSI set up failed in i40e_probe() as part of PF switch set up driver was trying to free misc IRQ vectors in i40e_clear_interrupt_scheme and produced a kernel Oops: Trying to free already-free IRQ 266 WARNING: CPU: 0 PID: 5 at kernel/irq/manage.c:1731 __free_irq+0x9a/0x300 Workqueue: events work_for_cpu_fn RIP: 0010:__free_irq+0x9a/0x300 Call Trace: ? synchronize_irq+0x3a/0xa0 free_irq+0x2e/0x60 i40e_clear_interrupt_scheme+0x53/0x190 [i40e] i40e_probe.part.108+0x134b/0x1a40 [i40e] ? kmem_cache_alloc+0x158/0x1c0 ? acpi_ut_update_ref_count.part.1+0x8e/0x345 ? acpi_ut_update_object_reference+0x15e/0x1e2 ? strstr+0x21/0x70 ? irq_get_irq_data+0xa/0x20 ? mp_check_pin_attr+0x13/0xc0 ? irq_get_irq_data+0xa/0x20 ? mp_map_pin_to_irq+0xd3/0x2f0 ? acpi_register_gsi_ioapic+0x93/0x170 ? pci_conf1_read+0xa4/0x100 ? pci_bus_read_config_word+0x49/0x70 ? do_pci_enable_device+0xcc/0x100 local_pci_probe+0x41/0x90 work_for_cpu_fn+0x16/0x20 process_one_work+0x1a7/0x360 worker_thread+0x1cf/0x390 ? create_worker+0x1a0/0x1a0 kthread+0x112/0x130 ? kthread_flush_work_fn+0x10/0x10 ret_from_fork+0x1f/0x40 The problem is that at that point misc IRQ vectors were not allocated yet and we get a call trace that driver is trying to free already free IRQ vectors. Add a check in i40e_clear_interrupt_scheme for __I40E_MISC_IRQ_REQUESTED PF state before calling i40e_free_misc_vector. This state is set only if misc IRQ vectors were properly initialized.
AI-Powered Analysis
Technical Analysis
CVE-2021-47424 is a vulnerability in the Linux kernel specifically affecting the i40e network driver, which is used for Intel Ethernet devices. The issue arises during the initialization and setup of the Virtual Station Interface (VSI) in the i40e_probe() function, part of the Physical Function (PF) switch setup process. When VSI setup fails, the driver attempts to free miscellaneous IRQ (Interrupt Request) vectors that were never properly allocated. This results in a kernel Oops, a critical error that causes the kernel to crash or become unstable. The root cause is that the driver calls i40e_clear_interrupt_scheme(), which in turn calls free_irq() on IRQ vectors that are already freed or never allocated, leading to a double-free or invalid free operation. The patch for this vulnerability adds a check for the PF state flag __I40E_MISC_IRQ_REQUESTED before attempting to free the IRQ vectors, ensuring that the driver only frees IRQs that were successfully allocated. This vulnerability can cause system instability or denial of service (DoS) due to kernel crashes when the affected driver encounters certain error conditions during device initialization or reconfiguration. Since this is a kernel-level issue affecting a network driver, it impacts systems running Linux kernels with the vulnerable i40e driver version, particularly those using Intel Ethernet hardware supported by this driver. There is no indication of known exploits in the wild, and no CVSS score has been assigned yet. The vulnerability requires no user interaction but does require the presence of the affected hardware and driver, and it can be triggered during device initialization or reconfiguration failures.
Potential Impact
For European organizations, the impact of CVE-2021-47424 can be significant in environments relying on Intel Ethernet devices supported by the i40e driver, especially in data centers, cloud infrastructure, and enterprise networks running Linux-based systems. The vulnerability can lead to kernel crashes and system instability, resulting in denial of service conditions that disrupt network connectivity and critical services. This can affect availability of networked applications, virtualized environments, and storage systems that depend on stable network interfaces. Organizations with high network throughput demands or those using advanced network virtualization features may experience increased risk. Additionally, repeated kernel crashes could lead to data loss or corruption in sensitive environments. Although no known exploits exist, the vulnerability's presence in the kernel means that attackers with local access or the ability to trigger device reinitialization could potentially cause service disruptions. This is particularly relevant for managed service providers, telecom operators, and enterprises with large Linux server deployments across Europe.
Mitigation Recommendations
To mitigate CVE-2021-47424, European organizations should prioritize updating their Linux kernel to the latest patched version that includes the fix for this vulnerability. Specifically, ensure that the i40e driver version in use contains the check for __I40E_MISC_IRQ_REQUESTED before freeing IRQ vectors. System administrators should audit their environments to identify servers and devices using Intel Ethernet hardware supported by the i40e driver. For critical systems, consider implementing kernel live patching solutions to apply fixes without downtime. Additionally, monitoring kernel logs for Oops messages related to free_irq or i40e driver errors can help detect attempts to trigger this vulnerability. Network device firmware and driver updates from hardware vendors should also be applied as part of a comprehensive patch management strategy. In environments where immediate patching is not feasible, isolating affected systems or limiting access to local users can reduce the risk of exploitation. Finally, incorporating this vulnerability into incident response and vulnerability management workflows will ensure timely detection and remediation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-21T14:58:30.827Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9833c4522896dcbe90e8
Added to database: 5/21/2025, 9:09:07 AM
Last enriched: 6/30/2025, 12:42:38 PM
Last updated: 8/1/2025, 1:08:27 AM
Views: 11
Related Threats
CVE-2025-55159: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in tokio-rs slab
MediumCVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-55150: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.