Skip to main content

CVE-2021-47560: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47560cvecve-2021-47560
Published: Fri May 24 2024 (05/24/2024, 15:12:49 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum: Protect driver from buggy firmware When processing port up/down events generated by the device's firmware, the driver protects itself from events reported for non-existent local ports, but not the CPU port (local port 0), which exists, but lacks a netdev. This can result in a NULL pointer dereference when calling netif_carrier_{on,off}(). Fix this by bailing early when processing an event reported for the CPU port. Problem was only observed when running on top of a buggy emulator.

AI-Powered Analysis

AILast updated: 06/30/2025, 14:41:05 UTC

Technical Analysis

CVE-2021-47560 is a vulnerability identified in the Linux kernel's mlxsw (Mellanox Spectrum) driver, which manages network switching hardware. The issue arises during the processing of port up/down events generated by the device's firmware. Specifically, the driver correctly protects itself from events related to non-existent local ports but fails to do so for the CPU port (local port 0). Although the CPU port exists, it lacks an associated network device (netdev). When the driver attempts to call netif_carrier_on() or netif_carrier_off() on this CPU port, it results in a NULL pointer dereference, causing a kernel crash (denial of service). The vulnerability was observed primarily in environments running on buggy emulators, where such erroneous events are more likely to be generated. The fix involves adding an early exit in the event processing logic to avoid handling events for the CPU port, thereby preventing the NULL pointer dereference. This vulnerability affects specific Linux kernel versions identified by the commit hash 28b1987ef5064dd5c43538ba1168ef7b801f3cad. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the primary impact of CVE-2021-47560 is the potential for denial of service (DoS) on systems running affected Linux kernel versions with Mellanox Spectrum network drivers. This could lead to unexpected kernel crashes, causing network outages or system downtime. Organizations relying on Linux servers for critical infrastructure, especially those using Mellanox hardware for high-performance networking (such as data centers, cloud providers, and telecommunications), may experience service disruptions. Although exploitation requires the presence of buggy firmware or emulators generating invalid port events, the risk remains for environments using such configurations, including testing or virtualized setups. Confidentiality and integrity impacts are minimal since the vulnerability does not allow code execution or privilege escalation. However, availability degradation could affect business continuity and operational reliability.

Mitigation Recommendations

European organizations should apply the patch provided by the Linux kernel maintainers that introduces early validation to ignore CPU port events, thereby preventing the NULL pointer dereference. Specifically, updating the Linux kernel to a version including the fix identified by commit 28b1987ef5064dd5c43538ba1168ef7b801f3cad is essential. Additionally, organizations should audit their use of Mellanox Spectrum hardware and firmware versions to ensure they are not running buggy firmware that could trigger this issue. For environments using emulators or virtualized testbeds, verify that the emulation software is up to date and does not generate invalid port events. Network monitoring should be enhanced to detect unusual port event activity that could indicate attempts to trigger the vulnerability. Finally, implement robust kernel crash recovery and failover mechanisms to minimize downtime if a crash occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-24T15:11:00.727Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9833c4522896dcbe9469

Added to database: 5/21/2025, 9:09:07 AM

Last enriched: 6/30/2025, 2:41:05 PM

Last updated: 8/11/2025, 9:05:05 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats