Skip to main content

CVE-2021-46973: Vulnerability in Linux Linux

High
VulnerabilityCVE-2021-46973cvecve-2021-46973
Published: Tue Feb 27 2024 (02/27/2024, 18:47:07 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: qrtr: Avoid potential use after free in MHI send It is possible that the MHI ul_callback will be invoked immediately following the queueing of the skb for transmission, leading to the callback decrementing the refcount of the associated sk and freeing the skb. As such the dereference of skb and the increment of the sk refcount must happen before the skb is queued, to avoid the skb to be used after free and potentially the sk to drop its last refcount..

AI-Powered Analysis

AILast updated: 07/03/2025, 05:42:09 UTC

Technical Analysis

CVE-2021-46973 is a high-severity use-after-free vulnerability identified in the Linux kernel's QRTR (Qualcomm IPC Router) network subsystem, specifically related to the MHI (Modem Host Interface) send functionality. The flaw arises because the MHI ul_callback can be invoked immediately after queuing a socket buffer (skb) for transmission. This callback decrements the reference count of the associated socket (sk) and may free the skb prematurely. The vulnerability occurs due to improper ordering: the dereference of the skb and the increment of the sk's reference count should happen before queuing the skb to prevent use-after-free conditions. If exploited, this can lead to the kernel dereferencing freed memory, causing memory corruption, system instability, or potentially arbitrary code execution within the kernel context. The vulnerability is tracked under CWE-416 (Use After Free) and has a CVSS v3.1 score of 8.4, reflecting its high impact on confidentiality, integrity, and availability. Exploitation requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), and no user interaction (UI:N), making it a serious threat in environments where untrusted local users or processes can interact with the affected kernel subsystem. No known exploits are currently reported in the wild, but the severity and nature of the flaw warrant prompt attention and patching. The affected versions correspond to specific Linux kernel commits identified by their hashes, indicating the vulnerability is present in certain recent kernel snapshots or versions prior to the fix. The vulnerability could be leveraged to escalate privileges or cause denial of service on affected systems.

Potential Impact

For European organizations, the impact of CVE-2021-46973 can be significant, especially for those relying on Linux-based infrastructure, including servers, embedded devices, and network equipment that utilize the Qualcomm IPC Router and MHI interfaces. Exploitation could lead to kernel crashes, denial of service, or privilege escalation, potentially compromising sensitive data and disrupting critical services. Industries such as telecommunications, manufacturing, automotive, and critical infrastructure that deploy Linux kernels with Qualcomm hardware integration are particularly at risk. The vulnerability could undermine the confidentiality and integrity of data processed on affected systems and impact availability by causing system instability or crashes. Given the widespread use of Linux in European data centers and embedded systems, unpatched systems could be targeted by local attackers or malicious insiders. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as proof-of-concept or weaponized exploits could emerge. Organizations with regulatory compliance obligations (e.g., GDPR) must consider the potential data breach implications and operational disruptions caused by exploitation.

Mitigation Recommendations

To mitigate CVE-2021-46973, European organizations should prioritize applying the official Linux kernel patches that reorder the reference counting and queuing operations in the MHI send path to prevent use-after-free conditions. System administrators should: 1) Identify all Linux systems running affected kernel versions, especially those integrating Qualcomm IPC Router and MHI components. 2) Deploy kernel updates or backported patches from trusted Linux distributors promptly. 3) For embedded or specialized devices, coordinate with hardware vendors for firmware or kernel updates addressing this vulnerability. 4) Restrict local access to trusted users only, as exploitation requires local access without privileges. 5) Implement kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR), and enable security modules like SELinux or AppArmor to limit the impact of potential exploitation. 6) Monitor system logs and kernel messages for anomalies indicating use-after-free or memory corruption events. 7) Conduct vulnerability scanning and penetration testing focused on local privilege escalation vectors to validate mitigations. These steps go beyond generic advice by emphasizing vendor coordination for embedded systems, local access restrictions, and active monitoring for exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-27T18:42:55.944Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9834c4522896dcbe9973

Added to database: 5/21/2025, 9:09:08 AM

Last enriched: 7/3/2025, 5:42:09 AM

Last updated: 7/30/2025, 1:30:23 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats