CVE-2021-47449

7.1 HIGH

📋 TL;DR

A locking vulnerability in the Linux kernel's Intel ice network driver causes a potential deadlock during device removal when Tx timestamp tracking is flushed. This can lead to system instability or denial of service when removing the network interface. Systems using Intel Ethernet 800 Series network adapters with affected kernel versions are impacted.

💻 Affected Systems

Products:
  • Linux kernel with Intel ice network driver
Versions: Kernel versions with commit 4dd0d5c33c3e up to fix commits 4d4a223a86afe658cd878800f09458e8bb54415d and 61616be899975404df44c20ab902464b60882cd7
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel Ethernet 800 Series network adapter hardware and the ice driver loaded.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

System deadlock requiring hard reboot, causing extended service disruption and potential data loss.

🟠

Likely Case

Kernel panic or system hang during network driver removal (e.g., during rmmod, system shutdown, or NIC replacement).

🟢

If Mitigated

Minor service interruption during driver operations with proper patching.

🌐 Internet-Facing: LOW - Requires local access to trigger via driver operations.
🏢 Internal Only: MEDIUM - Can be triggered by privileged users or system maintenance activities.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW - Triggered by normal driver removal operations.

Exploitation requires local privileged access (root or CAP_SYS_MODULE) to remove the driver module.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel commits 4d4a223a86afe658cd878800f09458e8bb54415d and 61616be899975404df44c20ab902464b60882cd7

Vendor Advisory: https://git.kernel.org/stable/c/4d4a223a86afe658cd878800f09458e8bb54415d

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing fixes 2. Reboot system 3. Verify ice driver loads without errors

🔧 Temporary Workarounds

Avoid driver removal

linux

Prevent removal of ice driver module to avoid triggering the deadlock.

echo 'install ice /bin/false' >> /etc/modprobe.d/ice-blacklist.conf

🧯 If You Can't Patch

  • Restrict module removal permissions to prevent unauthorized users from triggering the deadlock.
  • Monitor system logs for ice driver removal attempts and investigate any unauthorized activity.

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if ice driver is loaded: uname -r && lsmod | grep ice

Check Version:

uname -r

Verify Fix Applied:

Check kernel contains fix commits: git log --oneline | grep -E '4d4a223a86afe658cd878800f09458e8bb54415d|61616be899975404df44c20ab902464b60882cd7'

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages during ice driver removal
  • Sleeping function warnings from mutex operations
  • System hangs during rmmod ice

Network Indicators:

  • Sudden loss of network connectivity on affected interfaces

SIEM Query:

source="kernel" AND ("ice" AND ("panic" OR "deadlock" OR "sleeping function"))

🔗 References

📤 Share & Export