Skip to main content

CVE-2021-47541: Vulnerability in Linux Linux

High
VulnerabilityCVE-2021-47541cvecve-2021-47541
Published: Fri May 24 2024 (05/24/2024, 15:09:47 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() In mlx4_en_try_alloc_resources(), mlx4_en_copy_priv() is called and tmp->tx_cq will be freed on the error path of mlx4_en_copy_priv(). After that mlx4_en_alloc_resources() is called and there is a dereference of &tmp->tx_cq[t][i] in mlx4_en_alloc_resources(), which could lead to a use after free problem on failure of mlx4_en_copy_priv(). Fix this bug by adding a check of mlx4_en_copy_priv() This bug was found by a static analyzer. The analysis employs differential checking to identify inconsistent security operations (e.g., checks or kfrees) between two code paths and confirms that the inconsistent operations are not recovered in the current function or the callers, so they constitute bugs. Note that, as a bug found by static analysis, it can be a false positive or hard to trigger. Multiple researchers have cross-reviewed the bug. Builds with CONFIG_MLX4_EN=m show no new warnings, and our static analyzer no longer warns about this code.

AI-Powered Analysis

AILast updated: 06/30/2025, 14:27:04 UTC

Technical Analysis

CVE-2021-47541 is a use-after-free vulnerability identified in the Linux kernel's Mellanox mlx4_en network driver component. Specifically, the flaw exists in the function mlx4_en_try_alloc_resources() where a call to mlx4_en_copy_priv() can lead to premature freeing of the tx_cq resource on an error path. Subsequently, mlx4_en_alloc_resources() dereferences the freed tx_cq pointer, causing a use-after-free condition. This vulnerability arises due to inconsistent handling of resource allocation and deallocation between these functions, which was detected through static code analysis employing differential checking techniques. Although the bug is confirmed by multiple researchers, it is noted that it might be difficult to trigger in practice and could be a false positive. The mlx4_en driver is responsible for managing network resources for Mellanox ConnectX-3 and ConnectX-4 Ethernet devices, commonly used in high-performance computing and data center environments. The flaw could potentially lead to kernel memory corruption, causing system instability, crashes, or enabling privilege escalation if exploited. The vulnerability affects Linux kernel versions containing the specified commit hash and is mitigated by adding proper checks after mlx4_en_copy_priv() to prevent dereferencing freed memory. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, especially those operating data centers, cloud infrastructure, or high-performance computing clusters utilizing Mellanox ConnectX-3/4 network adapters on Linux systems, this vulnerability poses a risk of system crashes or kernel panics due to memory corruption. In worst-case scenarios, attackers with local access could exploit this flaw to escalate privileges or execute arbitrary code within the kernel context, compromising confidentiality, integrity, and availability of critical systems. Disruptions could affect service continuity, data processing, and network communications. Given the widespread use of Linux in enterprise and cloud environments across Europe, this vulnerability could impact sectors such as finance, telecommunications, research institutions, and government agencies that rely on stable and secure network infrastructure. However, the difficulty in triggering the bug and lack of known exploits reduce the immediate threat level, but patching remains essential to prevent potential future exploitation.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions that include the patch fixing CVE-2021-47541. Specifically, ensure that the mlx4_en driver is updated to the fixed version where additional checks prevent use-after-free conditions. Network administrators should audit systems using Mellanox ConnectX-3/4 adapters to identify vulnerable hosts. Employ kernel live patching solutions where feasible to minimize downtime during updates. Additionally, restrict local access to sensitive systems to trusted personnel only, as exploitation requires local code execution capabilities. Implement monitoring for unusual kernel crashes or system instability that might indicate attempts to trigger this vulnerability. Finally, maintain robust backup and recovery procedures to mitigate impact from potential system failures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-24T15:02:54.829Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9833c4522896dcbe9402

Added to database: 5/21/2025, 9:09:07 AM

Last enriched: 6/30/2025, 2:27:04 PM

Last updated: 8/11/2025, 10:56:44 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats