CVE-2021-47564: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: marvell: prestera: fix double free issue on err path fix error path handling in prestera_bridge_port_join() that cases prestera driver to crash (see below). Trace: Internal error: Oops: 96000044 [#1] SMP Modules linked in: prestera_pci prestera uio_pdrv_genirq CPU: 1 PID: 881 Comm: ip Not tainted 5.15.0 #1 pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : prestera_bridge_destroy+0x2c/0xb0 [prestera] lr : prestera_bridge_port_join+0x2cc/0x350 [prestera] sp : ffff800011a1b0f0 ... x2 : ffff000109ca6c80 x1 : dead000000000100 x0 : dead000000000122 Call trace: prestera_bridge_destroy+0x2c/0xb0 [prestera] prestera_bridge_port_join+0x2cc/0x350 [prestera] prestera_netdev_port_event.constprop.0+0x3c4/0x450 [prestera] prestera_netdev_event_handler+0xf4/0x110 [prestera] raw_notifier_call_chain+0x54/0x80 call_netdevice_notifiers_info+0x54/0xa0 __netdev_upper_dev_link+0x19c/0x380
AI Analysis
Technical Summary
CVE-2021-47564 is a vulnerability identified in the Linux kernel specifically affecting the Marvell Prestera network driver. The issue arises from improper error path handling in the function prestera_bridge_port_join(), which can lead to a double free condition. This double free occurs when the error handling code attempts to free memory or resources that have already been released, causing the Prestera driver to crash. The crash is evidenced by an internal kernel error (Oops) with a specific error code (96000044) and a stack trace pointing to functions within the Prestera driver such as prestera_bridge_destroy and prestera_bridge_port_join. This vulnerability can cause a denial of service (DoS) by crashing the kernel module responsible for managing network bridge ports on devices using the Prestera driver. The Prestera driver is used in network interface cards and switches based on Marvell Prestera silicon, which are common in enterprise and carrier-grade networking equipment running Linux. The vulnerability was fixed by correcting the error path handling to prevent the double free condition. There is no CVSS score assigned yet, and no known exploits in the wild have been reported as of the publication date. The vulnerability affects specific Linux kernel versions identified by commit hashes, indicating it is present in certain kernel builds prior to the fix. This issue is significant because a kernel crash can lead to system instability, loss of network connectivity, and potential disruption of services relying on affected network hardware.
Potential Impact
For European organizations, the impact of CVE-2021-47564 can be substantial, particularly for those relying on Linux-based network infrastructure that incorporates Marvell Prestera hardware. A successful exploitation leading to a kernel crash would result in denial of service, disrupting network operations and potentially affecting critical business services, data center connectivity, and cloud infrastructure. This could impact telecommunications providers, internet service providers, data centers, and enterprises with large-scale networking equipment. The loss of network availability can also affect compliance with regulations requiring high availability and data integrity, such as GDPR mandates for data protection and operational continuity. While the vulnerability does not appear to allow privilege escalation or remote code execution, the resulting DoS can be leveraged in targeted attacks to degrade network reliability or as part of a broader attack chain. Given the kernel-level nature of the vulnerability, recovery may require system reboots and patch deployments, which can be operationally disruptive.
Mitigation Recommendations
To mitigate CVE-2021-47564, European organizations should: 1) Identify if their Linux systems use the Marvell Prestera driver by auditing kernel modules and hardware inventory. 2) Apply the latest Linux kernel updates that include the fix for this vulnerability, ensuring that the patched version replaces affected kernel builds. 3) Where immediate patching is not possible, consider isolating affected systems or limiting network exposure to reduce the risk of triggering the vulnerability. 4) Monitor system logs and kernel messages for signs of crashes or Oops errors related to the Prestera driver to detect potential exploitation attempts. 5) Engage with hardware vendors and network equipment providers to confirm firmware and driver versions and receive guidance on updates. 6) Implement robust network segmentation and redundancy to minimize the impact of potential DoS events on critical services. 7) Incorporate this vulnerability into incident response and vulnerability management workflows to ensure timely detection and remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2021-47564: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: marvell: prestera: fix double free issue on err path fix error path handling in prestera_bridge_port_join() that cases prestera driver to crash (see below). Trace: Internal error: Oops: 96000044 [#1] SMP Modules linked in: prestera_pci prestera uio_pdrv_genirq CPU: 1 PID: 881 Comm: ip Not tainted 5.15.0 #1 pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : prestera_bridge_destroy+0x2c/0xb0 [prestera] lr : prestera_bridge_port_join+0x2cc/0x350 [prestera] sp : ffff800011a1b0f0 ... x2 : ffff000109ca6c80 x1 : dead000000000100 x0 : dead000000000122 Call trace: prestera_bridge_destroy+0x2c/0xb0 [prestera] prestera_bridge_port_join+0x2cc/0x350 [prestera] prestera_netdev_port_event.constprop.0+0x3c4/0x450 [prestera] prestera_netdev_event_handler+0xf4/0x110 [prestera] raw_notifier_call_chain+0x54/0x80 call_netdevice_notifiers_info+0x54/0xa0 __netdev_upper_dev_link+0x19c/0x380
AI-Powered Analysis
Technical Analysis
CVE-2021-47564 is a vulnerability identified in the Linux kernel specifically affecting the Marvell Prestera network driver. The issue arises from improper error path handling in the function prestera_bridge_port_join(), which can lead to a double free condition. This double free occurs when the error handling code attempts to free memory or resources that have already been released, causing the Prestera driver to crash. The crash is evidenced by an internal kernel error (Oops) with a specific error code (96000044) and a stack trace pointing to functions within the Prestera driver such as prestera_bridge_destroy and prestera_bridge_port_join. This vulnerability can cause a denial of service (DoS) by crashing the kernel module responsible for managing network bridge ports on devices using the Prestera driver. The Prestera driver is used in network interface cards and switches based on Marvell Prestera silicon, which are common in enterprise and carrier-grade networking equipment running Linux. The vulnerability was fixed by correcting the error path handling to prevent the double free condition. There is no CVSS score assigned yet, and no known exploits in the wild have been reported as of the publication date. The vulnerability affects specific Linux kernel versions identified by commit hashes, indicating it is present in certain kernel builds prior to the fix. This issue is significant because a kernel crash can lead to system instability, loss of network connectivity, and potential disruption of services relying on affected network hardware.
Potential Impact
For European organizations, the impact of CVE-2021-47564 can be substantial, particularly for those relying on Linux-based network infrastructure that incorporates Marvell Prestera hardware. A successful exploitation leading to a kernel crash would result in denial of service, disrupting network operations and potentially affecting critical business services, data center connectivity, and cloud infrastructure. This could impact telecommunications providers, internet service providers, data centers, and enterprises with large-scale networking equipment. The loss of network availability can also affect compliance with regulations requiring high availability and data integrity, such as GDPR mandates for data protection and operational continuity. While the vulnerability does not appear to allow privilege escalation or remote code execution, the resulting DoS can be leveraged in targeted attacks to degrade network reliability or as part of a broader attack chain. Given the kernel-level nature of the vulnerability, recovery may require system reboots and patch deployments, which can be operationally disruptive.
Mitigation Recommendations
To mitigate CVE-2021-47564, European organizations should: 1) Identify if their Linux systems use the Marvell Prestera driver by auditing kernel modules and hardware inventory. 2) Apply the latest Linux kernel updates that include the fix for this vulnerability, ensuring that the patched version replaces affected kernel builds. 3) Where immediate patching is not possible, consider isolating affected systems or limiting network exposure to reduce the risk of triggering the vulnerability. 4) Monitor system logs and kernel messages for signs of crashes or Oops errors related to the Prestera driver to detect potential exploitation attempts. 5) Engage with hardware vendors and network equipment providers to confirm firmware and driver versions and receive guidance on updates. 6) Implement robust network segmentation and redundancy to minimize the impact of potential DoS events on critical services. 7) Incorporate this vulnerability into incident response and vulnerability management workflows to ensure timely detection and remediation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-24T15:11:00.728Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9833c4522896dcbe94a1
Added to database: 5/21/2025, 9:09:07 AM
Last enriched: 6/30/2025, 2:42:06 PM
Last updated: 8/13/2025, 7:35:13 AM
Views: 11
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.