Skip to main content

CVE-2021-47297: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47297cvecve-2021-47297
Published: Tue May 21 2024 (05/21/2024, 14:35:19 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: fix uninit-value in caif_seqpkt_sendmsg When nr_segs equal to zero in iovec_from_user, the object msg->msg_iter.iov is uninit stack memory in caif_seqpkt_sendmsg which is defined in ___sys_sendmsg. So we cann't just judge msg->msg_iter.iov->base directlly. We can use nr_segs to judge msg in caif_seqpkt_sendmsg whether has data buffers. ===================================================== BUG: KMSAN: uninit-value in caif_seqpkt_sendmsg+0x693/0xf60 net/caif/caif_socket.c:542 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c9/0x220 lib/dump_stack.c:118 kmsan_report+0xf7/0x1e0 mm/kmsan/kmsan_report.c:118 __msan_warning+0x58/0xa0 mm/kmsan/kmsan_instr.c:215 caif_seqpkt_sendmsg+0x693/0xf60 net/caif/caif_socket.c:542 sock_sendmsg_nosec net/socket.c:652 [inline] sock_sendmsg net/socket.c:672 [inline] ____sys_sendmsg+0x12b6/0x1350 net/socket.c:2343 ___sys_sendmsg net/socket.c:2397 [inline] __sys_sendmmsg+0x808/0xc90 net/socket.c:2480 __compat_sys_sendmmsg net/compat.c:656 [inline]

AI-Powered Analysis

AILast updated: 06/26/2025, 11:09:20 UTC

Technical Analysis

CVE-2021-47297 is a medium-severity vulnerability in the Linux kernel affecting the CAIF (Cellular Interface) network protocol implementation, specifically in the caif_seqpkt_sendmsg function. The issue arises due to the use of uninitialized stack memory when the number of segments (nr_segs) is zero in the iovec_from_user function. This leads to the msg->msg_iter.iov pointer being uninitialized, which is then dereferenced without proper validation in caif_seqpkt_sendmsg. The vulnerability is rooted in improper handling of message buffers during the sendmsg system call, potentially causing undefined behavior or kernel crashes. The kernel's Kernel Memory Sanitizer (KMSAN) detected this uninitialized value usage, indicating a memory safety flaw. Exploitation requires local privileges (PR:L), no user interaction (UI:N), and has a low attack complexity (AC:L). The impact is limited to availability (A:H), meaning an attacker with some privileges could cause a denial of service by crashing the kernel or causing instability, but confidentiality and integrity are not affected. The vulnerability does not appear to have known exploits in the wild as of the publication date. The affected versions correspond to specific Linux kernel commits identified by their hashes, indicating this is a recent fix. The vulnerability is relevant for systems using the CAIF protocol, which is primarily used in embedded or cellular communication contexts within Linux environments.

Potential Impact

For European organizations, the primary impact of CVE-2021-47297 is the potential for denial-of-service (DoS) conditions on Linux systems utilizing the CAIF protocol stack. This could affect embedded devices, network equipment, or cellular communication infrastructure running vulnerable Linux kernels. Organizations in telecommunications, critical infrastructure, and industries relying on embedded Linux devices may experience service disruptions or system instability. Since the vulnerability requires local privileges, the risk is higher in environments where untrusted users have some level of access or where privilege escalation chains exist. The lack of impact on confidentiality and integrity reduces the risk of data breaches but does not eliminate operational risks. European telecom providers and industrial control systems using Linux-based cellular interfaces could be particularly sensitive to this vulnerability, as service availability is critical. Additionally, any disruption in embedded systems within manufacturing or transportation sectors could have cascading effects on operational continuity.

Mitigation Recommendations

To mitigate CVE-2021-47297, European organizations should: 1) Apply the latest Linux kernel patches that address this vulnerability as soon as they become available, ensuring that the CAIF protocol implementation is updated. 2) Audit and restrict local user privileges to minimize the risk of exploitation by unprivileged users. 3) Implement strict access controls and monitoring on systems running embedded or cellular Linux stacks to detect abnormal behavior or crashes related to sendmsg system calls. 4) For embedded devices, coordinate with vendors to obtain firmware updates incorporating the patched kernel versions. 5) Employ kernel hardening techniques such as Kernel Address Sanitizer (KASAN) and Kernel Memory Sanitizer (KMSAN) during development and testing phases to detect similar issues proactively. 6) Conduct regular security assessments of embedded Linux systems, focusing on network protocol stacks and local privilege boundaries. 7) Consider network segmentation to isolate vulnerable devices and limit the impact of potential DoS conditions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-21T13:27:52.132Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9835c4522896dcbea34a

Added to database: 5/21/2025, 9:09:09 AM

Last enriched: 6/26/2025, 11:09:20 AM

Last updated: 8/18/2025, 11:34:55 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats