CVE-2021-47148

7.8 HIGH

📋 TL;DR

A buffer overflow vulnerability in the Linux kernel's octeontx2-pf driver allows local attackers to corrupt kernel memory. This affects systems using Marvell OcteonTX2 network adapters with the vulnerable driver. Attackers with local access can potentially escalate privileges or crash the system.

💻 Affected Systems

Products:
  • Linux kernel with octeontx2-pf driver
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Marvell OcteonTX2 network hardware where the octeontx2-pf driver is loaded and active.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to root, kernel panic causing system crash, or arbitrary code execution in kernel context.

🟠

Likely Case

Kernel panic leading to denial of service, or limited memory corruption affecting system stability.

🟢

If Mitigated

No impact if proper access controls prevent local users from executing ethtool commands or if the vulnerable driver is not loaded.

🌐 Internet-Facing: LOW - Requires local access to the system, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local attackers or malicious users with shell access could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and ability to call ethtool_set_rxfh() with malicious input. No public exploits known as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits 389146bc6d2bbb20714d06624b74856320ce40f7 and e5cc361e21648b75f935f9571d4003aaee480214

Vendor Advisory: https://git.kernel.org/stable/c/389146bc6d2bbb20714d06624b74856320ce40f7

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Check with your distribution for specific patched kernel versions. 3. Reboot system to load patched kernel.

🔧 Temporary Workarounds

Disable octeontx2-pf driver

linux

Prevent loading of vulnerable driver if OcteonTX2 hardware is not required

echo 'blacklist octeontx2-pf' >> /etc/modprobe.d/blacklist.conf
rmmod octeontx2-pf

Restrict ethtool access

linux

Limit which users can execute ethtool commands via sudo or capabilities

chmod 750 /sbin/ethtool
setcap cap_net_admin=ep /sbin/ethtool

🧯 If You Can't Patch

  • Implement strict access controls to prevent local users from executing ethtool commands
  • Monitor for suspicious ethtool usage or kernel panic events

🔍 How to Verify

Check if Vulnerable:

Check if octeontx2-pf driver is loaded: lsmod | grep octeontx2-pf. Check kernel version against distribution security advisories.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits or is newer than vulnerable versions. Check with: uname -r

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • System crashes or reboots
  • ethtool command execution in audit logs

Network Indicators:

  • None - local exploitation only

SIEM Query:

source="kernel" AND "panic" OR source="audit" AND "ethtool" AND "rxfh"

🔗 References

📤 Share & Export