CVE-2021-47131
📋 TL;DR
A use-after-free vulnerability in the Linux kernel's TLS offload implementation allows attackers to potentially execute arbitrary code or cause system crashes. This affects Linux systems using TLS hardware offload on network devices. The vulnerability triggers when a network interface with active TLS connections goes down and back up while connections remain active.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel memory corruption leading to arbitrary code execution with kernel privileges, system crashes, or data leakage.
Likely Case
System instability, kernel panics, or denial of service affecting TLS-enabled network connections.
If Mitigated
Minimal impact if patched or if TLS hardware offload is disabled.
🎯 Exploit Status
Exploitation requires control over network interface state changes and timing with active TLS connections.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits: 0f1e6fe66977a864fe850522316f713d7b926fd9, c55dcdd435aa6c6ad6ccac0a4c636d010ee367a4, f1d4184f128dede82a59a841658ed40d4e6d3aa2
Vendor Advisory: https://git.kernel.org/stable/c/0f1e6fe66977a864fe850522316f713d7b926fd9
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable TLS hardware offload
linuxPrevent use of vulnerable TLS offload functionality by disabling hardware acceleration
ethtool -K <interface> tls-hw-tx-offload off
ethtool -K <interface> tls-hw-rx-offload off
🧯 If You Can't Patch
- Disable TLS hardware offload on all network interfaces
- Avoid bringing network interfaces with active TLS connections down and up while connections are active
🔍 How to Verify
Check if Vulnerable:
Check if TLS offload is enabled: ethtool -k <interface> | grep tls-offload
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes fix commits or is newer than vulnerable versions
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- Use-after-free kernel messages
- TLS connection failures after interface state changes
Network Indicators:
- Unexpected TLS connection resets
- Network interface flapping with active TLS sessions
SIEM Query:
kernel: *use-after-free* AND (tls OR ktls)
🔗 References
- https://git.kernel.org/stable/c/0f1e6fe66977a864fe850522316f713d7b926fd9
- https://git.kernel.org/stable/c/c55dcdd435aa6c6ad6ccac0a4c636d010ee367a4
- https://git.kernel.org/stable/c/f1d4184f128dede82a59a841658ed40d4e6d3aa2
- https://git.kernel.org/stable/c/0f1e6fe66977a864fe850522316f713d7b926fd9
- https://git.kernel.org/stable/c/c55dcdd435aa6c6ad6ccac0a4c636d010ee367a4
- https://git.kernel.org/stable/c/f1d4184f128dede82a59a841658ed40d4e6d3aa2