Skip to main content

CVE-2021-47547: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47547cvecve-2021-47547
Published: Fri May 24 2024 (05/24/2024, 15:09:51 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound In line 5001, if all id in the array 'lp->phy[8]' is not 0, when the 'for' end, the 'k' is 8. At this time, the array 'lp->phy[8]' may be out of bound.

AI-Powered Analysis

AILast updated: 06/30/2025, 14:27:44 UTC

Technical Analysis

CVE-2021-47547 is a medium-severity vulnerability identified in the Linux kernel's network driver code, specifically within the tulip driver for de4x5 network interface cards. The issue arises from an out-of-bounds array access in the 'lp->phy' array, which is defined with 8 elements indexed from 0 to 7. The vulnerability occurs when a loop iterates over this array and the loop counter 'k' reaches 8, causing an attempt to access 'lp->phy[8]', which is outside the valid bounds of the array. This out-of-bounds access can lead to undefined behavior, including potential memory corruption. The vulnerability requires local privileges (PR:L) and low attack complexity (AC:L), but no user interaction (UI:N) is needed. The impact is limited to integrity and availability, with no confidentiality impact. Exploitation could allow a local attacker with some privileges to cause a denial of service or potentially escalate privileges by corrupting kernel memory structures. The vulnerability has been patched in the Linux kernel, but no known exploits are currently reported in the wild. The affected versions are identified by specific commit hashes, indicating that the issue is present in certain kernel builds prior to the patch. The CVSS v3.1 base score is 4.4, reflecting a medium severity level.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to systems running vulnerable Linux kernel versions with the tulip de4x5 network driver enabled. The impact includes potential denial of service or integrity compromise on affected hosts, which could disrupt critical network services or lead to local privilege escalation. Organizations relying on legacy or specialized hardware using the de4x5 driver may be particularly vulnerable. Given that the vulnerability requires local privileges, the threat is more significant in environments where untrusted users have shell or local access, such as multi-tenant servers, shared workstations, or development environments. The absence of known exploits reduces immediate risk, but the presence of a patch means that unpatched systems remain exposed. For European enterprises with strict uptime and security requirements, especially in sectors like finance, telecommunications, and critical infrastructure, this vulnerability could impact service reliability and system integrity if exploited.

Mitigation Recommendations

1. Apply the official Linux kernel patches that address CVE-2021-47547 as soon as possible to eliminate the out-of-bounds access. 2. Identify and inventory systems running Linux kernels with the tulip de4x5 driver enabled, focusing on legacy or specialized hardware that may still use this driver. 3. Restrict local access to trusted users only and enforce strict access controls to minimize the risk of local exploitation. 4. Employ kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and Kernel Page Table Isolation (KPTI) to reduce the impact of potential memory corruption. 5. Monitor system logs and kernel messages for anomalies that could indicate exploitation attempts or crashes related to the network driver. 6. Consider disabling the tulip de4x5 driver if it is not required, to eliminate the attack surface. 7. Incorporate this vulnerability into vulnerability management and patching workflows to ensure timely updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-24T15:02:54.829Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9833c4522896dcbe940e

Added to database: 5/21/2025, 9:09:07 AM

Last enriched: 6/30/2025, 2:27:44 PM

Last updated: 8/15/2025, 12:54:24 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats