CVE-2021-47558: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: stmmac: Disable Tx queues when reconfiguring the interface The Tx queues were not disabled in situations where the driver needed to stop the interface to apply a new configuration. This could result in a kernel panic when doing any of the 3 following actions: * reconfiguring the number of queues (ethtool -L) * reconfiguring the size of the ring buffers (ethtool -G) * installing/removing an XDP program (ip l set dev ethX xdp) Prevent the panic by making sure netif_tx_disable is called when stopping an interface. Without this patch, the following kernel panic can be observed when doing any of the actions above: Unable to handle kernel paging request at virtual address ffff80001238d040 [....] Call trace: dwmac4_set_addr+0x8/0x10 dev_hard_start_xmit+0xe4/0x1ac sch_direct_xmit+0xe8/0x39c __dev_queue_xmit+0x3ec/0xaf0 dev_queue_xmit+0x14/0x20 [...] [ end trace 0000000000000002 ]---
AI Analysis
Technical Summary
CVE-2021-47558 is a vulnerability identified in the Linux kernel's network driver subsystem, specifically within the stmmac Ethernet driver. The issue arises because the transmit (Tx) queues are not properly disabled when the network interface is reconfigured. This improper handling occurs during certain operations such as reconfiguring the number of Tx queues (via 'ethtool -L'), adjusting the size of ring buffers (via 'ethtool -G'), or installing/removing an eXpress Data Path (XDP) program (using 'ip l set dev ethX xdp'). When these operations are performed without disabling the Tx queues, it can lead to a kernel panic due to a kernel paging request fault. The panic is triggered because the driver attempts to access memory that is no longer valid or properly synchronized, as indicated by the call trace involving functions like dwmac4_set_addr, dev_hard_start_xmit, and dev_queue_xmit. The root cause is the failure to invoke 'netif_tx_disable' when stopping the interface to apply new configurations. The patch for this vulnerability ensures that Tx queues are disabled appropriately, preventing the kernel panic. This vulnerability affects Linux kernel versions containing the specified commit hashes and is relevant to systems using the stmmac driver for Ethernet interfaces. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability can cause denial of service (DoS) conditions on affected Linux systems, particularly those relying on the stmmac Ethernet driver. Systems undergoing network reconfiguration or deploying XDP programs dynamically could experience unexpected kernel panics, leading to service interruptions. This is especially critical for infrastructure providers, data centers, and enterprises running Linux-based network appliances or servers that require high availability. The impact on confidentiality and integrity is minimal since the vulnerability does not allow arbitrary code execution or privilege escalation directly. However, the availability impact can be significant, potentially disrupting network connectivity and dependent services. Organizations with automated network management or frequent interface reconfiguration are at higher risk. Given the widespread use of Linux in European IT environments, particularly in telecommunications, cloud providers, and industrial control systems, this vulnerability could affect critical infrastructure if not addressed promptly.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Apply the official Linux kernel patches that include the fix for CVE-2021-47558 as soon as they become available from their Linux distribution vendors. 2) Avoid performing network interface reconfiguration operations (ethtool -L, ethtool -G) or installing/removing XDP programs on affected systems until patched. 3) Implement monitoring to detect kernel panics or crashes related to network interface reconfiguration. 4) For environments using custom or embedded Linux kernels, ensure that the stmmac driver is updated to include the fix. 5) Test kernel updates in staging environments to validate stability before production deployment. 6) Consider network interface redundancy and failover mechanisms to minimize service disruption during potential crashes. 7) Educate system administrators about the vulnerability and safe operational procedures until patches are applied.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2021-47558: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: stmmac: Disable Tx queues when reconfiguring the interface The Tx queues were not disabled in situations where the driver needed to stop the interface to apply a new configuration. This could result in a kernel panic when doing any of the 3 following actions: * reconfiguring the number of queues (ethtool -L) * reconfiguring the size of the ring buffers (ethtool -G) * installing/removing an XDP program (ip l set dev ethX xdp) Prevent the panic by making sure netif_tx_disable is called when stopping an interface. Without this patch, the following kernel panic can be observed when doing any of the actions above: Unable to handle kernel paging request at virtual address ffff80001238d040 [....] Call trace: dwmac4_set_addr+0x8/0x10 dev_hard_start_xmit+0xe4/0x1ac sch_direct_xmit+0xe8/0x39c __dev_queue_xmit+0x3ec/0xaf0 dev_queue_xmit+0x14/0x20 [...] [ end trace 0000000000000002 ]---
AI-Powered Analysis
Technical Analysis
CVE-2021-47558 is a vulnerability identified in the Linux kernel's network driver subsystem, specifically within the stmmac Ethernet driver. The issue arises because the transmit (Tx) queues are not properly disabled when the network interface is reconfigured. This improper handling occurs during certain operations such as reconfiguring the number of Tx queues (via 'ethtool -L'), adjusting the size of ring buffers (via 'ethtool -G'), or installing/removing an eXpress Data Path (XDP) program (using 'ip l set dev ethX xdp'). When these operations are performed without disabling the Tx queues, it can lead to a kernel panic due to a kernel paging request fault. The panic is triggered because the driver attempts to access memory that is no longer valid or properly synchronized, as indicated by the call trace involving functions like dwmac4_set_addr, dev_hard_start_xmit, and dev_queue_xmit. The root cause is the failure to invoke 'netif_tx_disable' when stopping the interface to apply new configurations. The patch for this vulnerability ensures that Tx queues are disabled appropriately, preventing the kernel panic. This vulnerability affects Linux kernel versions containing the specified commit hashes and is relevant to systems using the stmmac driver for Ethernet interfaces. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability can cause denial of service (DoS) conditions on affected Linux systems, particularly those relying on the stmmac Ethernet driver. Systems undergoing network reconfiguration or deploying XDP programs dynamically could experience unexpected kernel panics, leading to service interruptions. This is especially critical for infrastructure providers, data centers, and enterprises running Linux-based network appliances or servers that require high availability. The impact on confidentiality and integrity is minimal since the vulnerability does not allow arbitrary code execution or privilege escalation directly. However, the availability impact can be significant, potentially disrupting network connectivity and dependent services. Organizations with automated network management or frequent interface reconfiguration are at higher risk. Given the widespread use of Linux in European IT environments, particularly in telecommunications, cloud providers, and industrial control systems, this vulnerability could affect critical infrastructure if not addressed promptly.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Apply the official Linux kernel patches that include the fix for CVE-2021-47558 as soon as they become available from their Linux distribution vendors. 2) Avoid performing network interface reconfiguration operations (ethtool -L, ethtool -G) or installing/removing XDP programs on affected systems until patched. 3) Implement monitoring to detect kernel panics or crashes related to network interface reconfiguration. 4) For environments using custom or embedded Linux kernels, ensure that the stmmac driver is updated to include the fix. 5) Test kernel updates in staging environments to validate stability before production deployment. 6) Consider network interface redundancy and failover mechanisms to minimize service disruption during potential crashes. 7) Educate system administrators about the vulnerability and safe operational procedures until patches are applied.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-24T15:02:54.834Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9833c4522896dcbe945d
Added to database: 5/21/2025, 9:09:07 AM
Last enriched: 6/30/2025, 2:40:35 PM
Last updated: 8/17/2025, 3:15:35 PM
Views: 21
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.