CVE-2021-47450: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Fix host stage-2 PGD refcount The KVM page-table library refcounts the pages of concatenated stage-2 PGDs individually. However, when running KVM in protected mode, the host's stage-2 PGD is currently managed by EL2 as a single high-order compound page, which can cause the refcount of the tail pages to reach 0 when they shouldn't, hence corrupting the page-table. Fix this by introducing a new hyp_split_page() helper in the EL2 page allocator (matching the kernel's split_page() function), and make use of it from host_s2_zalloc_pages_exact().
AI Analysis
Technical Summary
CVE-2021-47450 is a vulnerability identified in the Linux kernel's KVM (Kernel-based Virtual Machine) implementation for the ARM64 architecture. Specifically, it concerns the management of stage-2 page global directories (PGDs) used in virtualized environments running on ARM64 processors. The vulnerability arises from incorrect reference counting of pages in the KVM page-table library. Normally, the library refcounts pages of concatenated stage-2 PGDs individually to manage memory correctly. However, when KVM operates in protected mode, the host's stage-2 PGD is managed by the EL2 exception level as a single high-order compound page rather than individual pages. This discrepancy can cause the reference count of the tail pages to erroneously drop to zero, leading to premature freeing or corruption of page-table entries. Such corruption can destabilize the virtual machine's memory management, potentially causing crashes, data corruption, or enabling privilege escalation within the guest or host environment. The fix involves introducing a new helper function, hyp_split_page(), in the EL2 page allocator to properly split and manage compound pages, aligning the reference counting with the kernel's split_page() function. This correction ensures that the host stage-2 PGD pages are correctly accounted for, preventing the refcount underflow and subsequent page-table corruption. The vulnerability affects Linux kernel versions identified by the commit hash 1025c8c0c6accfcbdc8f52ca1940160f65cd87d6 and was published on May 22, 2024. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to environments using ARM64-based virtualization with KVM, which is increasingly common in cloud infrastructure, edge computing, and specialized server deployments. Exploitation could lead to memory corruption within virtual machines, causing instability, data loss, or potential privilege escalation that might allow attackers to escape guest VM isolation and compromise the host system. This could undermine the confidentiality and integrity of sensitive data processed in virtualized environments. Organizations relying on ARM64 KVM virtualization for critical workloads, including financial institutions, research centers, and government agencies, could face operational disruptions or data breaches if the vulnerability is exploited. Although no active exploits are known, the complexity of the issue and its presence in the Linux kernel—a widely used OS kernel in Europe—means that timely patching is essential to maintain secure virtualization infrastructure.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the patch for CVE-2021-47450. Since the vulnerability is specific to ARM64 KVM virtualization, organizations should audit their infrastructure to identify ARM64 hosts running KVM and verify kernel versions. For environments where immediate patching is not feasible, consider temporarily disabling KVM protected mode on ARM64 hosts if operationally acceptable, to mitigate the risk of refcount corruption. Additionally, implement strict access controls and monitoring on virtualization hosts to detect anomalous behavior that might indicate exploitation attempts. Regularly review and test backup and recovery procedures for virtual machines to minimize impact in case of corruption or crashes. Engage with Linux distribution vendors and cloud providers to ensure timely deployment of security updates. Finally, maintain awareness of any emerging exploit reports related to this vulnerability to adjust defenses accordingly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Estonia
CVE-2021-47450: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Fix host stage-2 PGD refcount The KVM page-table library refcounts the pages of concatenated stage-2 PGDs individually. However, when running KVM in protected mode, the host's stage-2 PGD is currently managed by EL2 as a single high-order compound page, which can cause the refcount of the tail pages to reach 0 when they shouldn't, hence corrupting the page-table. Fix this by introducing a new hyp_split_page() helper in the EL2 page allocator (matching the kernel's split_page() function), and make use of it from host_s2_zalloc_pages_exact().
AI-Powered Analysis
Technical Analysis
CVE-2021-47450 is a vulnerability identified in the Linux kernel's KVM (Kernel-based Virtual Machine) implementation for the ARM64 architecture. Specifically, it concerns the management of stage-2 page global directories (PGDs) used in virtualized environments running on ARM64 processors. The vulnerability arises from incorrect reference counting of pages in the KVM page-table library. Normally, the library refcounts pages of concatenated stage-2 PGDs individually to manage memory correctly. However, when KVM operates in protected mode, the host's stage-2 PGD is managed by the EL2 exception level as a single high-order compound page rather than individual pages. This discrepancy can cause the reference count of the tail pages to erroneously drop to zero, leading to premature freeing or corruption of page-table entries. Such corruption can destabilize the virtual machine's memory management, potentially causing crashes, data corruption, or enabling privilege escalation within the guest or host environment. The fix involves introducing a new helper function, hyp_split_page(), in the EL2 page allocator to properly split and manage compound pages, aligning the reference counting with the kernel's split_page() function. This correction ensures that the host stage-2 PGD pages are correctly accounted for, preventing the refcount underflow and subsequent page-table corruption. The vulnerability affects Linux kernel versions identified by the commit hash 1025c8c0c6accfcbdc8f52ca1940160f65cd87d6 and was published on May 22, 2024. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to environments using ARM64-based virtualization with KVM, which is increasingly common in cloud infrastructure, edge computing, and specialized server deployments. Exploitation could lead to memory corruption within virtual machines, causing instability, data loss, or potential privilege escalation that might allow attackers to escape guest VM isolation and compromise the host system. This could undermine the confidentiality and integrity of sensitive data processed in virtualized environments. Organizations relying on ARM64 KVM virtualization for critical workloads, including financial institutions, research centers, and government agencies, could face operational disruptions or data breaches if the vulnerability is exploited. Although no active exploits are known, the complexity of the issue and its presence in the Linux kernel—a widely used OS kernel in Europe—means that timely patching is essential to maintain secure virtualization infrastructure.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the patch for CVE-2021-47450. Since the vulnerability is specific to ARM64 KVM virtualization, organizations should audit their infrastructure to identify ARM64 hosts running KVM and verify kernel versions. For environments where immediate patching is not feasible, consider temporarily disabling KVM protected mode on ARM64 hosts if operationally acceptable, to mitigate the risk of refcount corruption. Additionally, implement strict access controls and monitoring on virtualization hosts to detect anomalous behavior that might indicate exploitation attempts. Regularly review and test backup and recovery procedures for virtual machines to minimize impact in case of corruption or crashes. Engage with Linux distribution vendors and cloud providers to ensure timely deployment of security updates. Finally, maintain awareness of any emerging exploit reports related to this vulnerability to adjust defenses accordingly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-21T14:58:30.832Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9833c4522896dcbe919e
Added to database: 5/21/2025, 9:09:07 AM
Last enriched: 6/30/2025, 1:13:14 PM
Last updated: 8/15/2025, 11:37:17 AM
Views: 18
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.