CVE-2021-47507: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: nfsd: Fix nsfd startup race (again) Commit bd5ae9288d64 ("nfsd: register pernet ops last, unregister first") has re-opened rpc_pipefs_event() race against nfsd_net_id registration (register_pernet_subsys()) which has been fixed by commit bb7ffbf29e76 ("nfsd: fix nsfd startup race triggering BUG_ON"). Restore the order of register_pernet_subsys() vs register_cld_notifier(). Add WARN_ON() to prevent a future regression. Crash info: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000012 CPU: 8 PID: 345 Comm: mount Not tainted 5.4.144-... #1 pc : rpc_pipefs_event+0x54/0x120 [nfsd] lr : rpc_pipefs_event+0x48/0x120 [nfsd] Call trace: rpc_pipefs_event+0x54/0x120 [nfsd] blocking_notifier_call_chain rpc_fill_super get_tree_keyed rpc_fs_get_tree vfs_get_tree do_mount ksys_mount __arm64_sys_mount el0_svc_handler el0_svc
AI Analysis
Technical Summary
CVE-2021-47507 is a vulnerability in the Linux kernel's NFS daemon (nfsd) subsystem related to a race condition during the startup sequence of the nfsd service. Specifically, the issue arises from the improper ordering of registration and unregistration calls involving per-network namespace operations (register_pernet_subsys) and client death notifiers (register_cld_notifier). A recent commit (bd5ae9288d64) intended to fix an earlier race condition inadvertently reintroduced a race between rpc_pipefs_event() and nfsd_net_id registration. This race can lead to a kernel NULL pointer dereference at a low virtual address (0x12), causing a kernel crash (BUG_ON) during operations such as mounting an NFS filesystem. The crash trace indicates the fault occurs within rpc_pipefs_event, which is part of the nfsd kernel module handling RPC pipe filesystem events. The vulnerability is rooted in concurrency issues in kernel initialization code paths, particularly affecting ARM64 architectures as indicated by the call trace. The fix involves restoring the correct order of subsystem registration calls and adding WARN_ON() checks to prevent future regressions. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The affected Linux kernel versions include several commits around the 5.4.144 kernel series and related patches. This vulnerability could be triggered by local users or processes attempting to mount NFS filesystems, potentially leading to denial of service via kernel panic or system crash.
Potential Impact
For European organizations, the primary impact of CVE-2021-47507 is the risk of denial of service (DoS) on Linux servers running vulnerable kernel versions with NFS services enabled. NFS is widely used in enterprise environments for shared storage and file system access, especially in data centers and cloud infrastructures. A kernel crash caused by this vulnerability could disrupt critical file sharing services, leading to downtime and potential data availability issues. Although this vulnerability does not appear to allow privilege escalation or remote code execution, the resulting system instability could affect business continuity, especially for organizations relying on Linux-based NFS servers for collaborative workflows or storage backends. The lack of known exploits reduces immediate risk, but the presence of a kernel panic vulnerability in a core subsystem warrants prompt attention. European organizations with large-scale Linux deployments, particularly those using ARM64 architecture or customized kernels, may face increased exposure. Additionally, sectors such as finance, manufacturing, and government that depend on high availability and secure file sharing could experience operational disruptions if this vulnerability is exploited or triggered accidentally.
Mitigation Recommendations
To mitigate CVE-2021-47507, European organizations should: 1) Identify and inventory Linux systems running affected kernel versions, especially those with NFS server functionality enabled. 2) Apply the latest kernel patches or updates from trusted Linux distributions that include the fix restoring the correct order of pernet subsystem registration and adding WARN_ON() safeguards. If official patches are not yet available, consider backporting the fix from the relevant commit (bd5ae9288d64) after thorough testing. 3) Restrict access to NFS mount operations to trusted users and processes to minimize the risk of triggering the race condition. 4) Monitor kernel logs for WARN_ON() messages or unusual crashes related to nfsd or rpc_pipefs_event to detect potential exploitation attempts or regressions. 5) For critical systems, consider temporarily disabling NFS services or migrating workloads to alternative file sharing solutions until patches are applied. 6) Implement robust kernel crash recovery and system monitoring to reduce downtime in case of unexpected crashes. 7) Engage with Linux vendor support channels to receive timely updates and advisories related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2021-47507: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: nfsd: Fix nsfd startup race (again) Commit bd5ae9288d64 ("nfsd: register pernet ops last, unregister first") has re-opened rpc_pipefs_event() race against nfsd_net_id registration (register_pernet_subsys()) which has been fixed by commit bb7ffbf29e76 ("nfsd: fix nsfd startup race triggering BUG_ON"). Restore the order of register_pernet_subsys() vs register_cld_notifier(). Add WARN_ON() to prevent a future regression. Crash info: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000012 CPU: 8 PID: 345 Comm: mount Not tainted 5.4.144-... #1 pc : rpc_pipefs_event+0x54/0x120 [nfsd] lr : rpc_pipefs_event+0x48/0x120 [nfsd] Call trace: rpc_pipefs_event+0x54/0x120 [nfsd] blocking_notifier_call_chain rpc_fill_super get_tree_keyed rpc_fs_get_tree vfs_get_tree do_mount ksys_mount __arm64_sys_mount el0_svc_handler el0_svc
AI-Powered Analysis
Technical Analysis
CVE-2021-47507 is a vulnerability in the Linux kernel's NFS daemon (nfsd) subsystem related to a race condition during the startup sequence of the nfsd service. Specifically, the issue arises from the improper ordering of registration and unregistration calls involving per-network namespace operations (register_pernet_subsys) and client death notifiers (register_cld_notifier). A recent commit (bd5ae9288d64) intended to fix an earlier race condition inadvertently reintroduced a race between rpc_pipefs_event() and nfsd_net_id registration. This race can lead to a kernel NULL pointer dereference at a low virtual address (0x12), causing a kernel crash (BUG_ON) during operations such as mounting an NFS filesystem. The crash trace indicates the fault occurs within rpc_pipefs_event, which is part of the nfsd kernel module handling RPC pipe filesystem events. The vulnerability is rooted in concurrency issues in kernel initialization code paths, particularly affecting ARM64 architectures as indicated by the call trace. The fix involves restoring the correct order of subsystem registration calls and adding WARN_ON() checks to prevent future regressions. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The affected Linux kernel versions include several commits around the 5.4.144 kernel series and related patches. This vulnerability could be triggered by local users or processes attempting to mount NFS filesystems, potentially leading to denial of service via kernel panic or system crash.
Potential Impact
For European organizations, the primary impact of CVE-2021-47507 is the risk of denial of service (DoS) on Linux servers running vulnerable kernel versions with NFS services enabled. NFS is widely used in enterprise environments for shared storage and file system access, especially in data centers and cloud infrastructures. A kernel crash caused by this vulnerability could disrupt critical file sharing services, leading to downtime and potential data availability issues. Although this vulnerability does not appear to allow privilege escalation or remote code execution, the resulting system instability could affect business continuity, especially for organizations relying on Linux-based NFS servers for collaborative workflows or storage backends. The lack of known exploits reduces immediate risk, but the presence of a kernel panic vulnerability in a core subsystem warrants prompt attention. European organizations with large-scale Linux deployments, particularly those using ARM64 architecture or customized kernels, may face increased exposure. Additionally, sectors such as finance, manufacturing, and government that depend on high availability and secure file sharing could experience operational disruptions if this vulnerability is exploited or triggered accidentally.
Mitigation Recommendations
To mitigate CVE-2021-47507, European organizations should: 1) Identify and inventory Linux systems running affected kernel versions, especially those with NFS server functionality enabled. 2) Apply the latest kernel patches or updates from trusted Linux distributions that include the fix restoring the correct order of pernet subsystem registration and adding WARN_ON() safeguards. If official patches are not yet available, consider backporting the fix from the relevant commit (bd5ae9288d64) after thorough testing. 3) Restrict access to NFS mount operations to trusted users and processes to minimize the risk of triggering the race condition. 4) Monitor kernel logs for WARN_ON() messages or unusual crashes related to nfsd or rpc_pipefs_event to detect potential exploitation attempts or regressions. 5) For critical systems, consider temporarily disabling NFS services or migrating workloads to alternative file sharing solutions until patches are applied. 6) Implement robust kernel crash recovery and system monitoring to reduce downtime in case of unexpected crashes. 7) Engage with Linux vendor support channels to receive timely updates and advisories related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-22T06:20:56.206Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9822c4522896dcbde11a
Added to database: 5/21/2025, 9:08:50 AM
Last enriched: 6/28/2025, 5:24:46 AM
Last updated: 8/18/2025, 11:22:32 PM
Views: 14
Related Threats
CVE-2025-7496: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpclever WPC Smart Compare for WooCommerce
MediumCVE-2025-57725
LowCVE-2025-57724
LowCVE-2025-57723
LowCVE-2025-57722
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.