CVE-2021-47297: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: fix uninit-value in caif_seqpkt_sendmsg When nr_segs equal to zero in iovec_from_user, the object msg->msg_iter.iov is uninit stack memory in caif_seqpkt_sendmsg which is defined in ___sys_sendmsg. So we cann't just judge msg->msg_iter.iov->base directlly. We can use nr_segs to judge msg in caif_seqpkt_sendmsg whether has data buffers. ===================================================== BUG: KMSAN: uninit-value in caif_seqpkt_sendmsg+0x693/0xf60 net/caif/caif_socket.c:542 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c9/0x220 lib/dump_stack.c:118 kmsan_report+0xf7/0x1e0 mm/kmsan/kmsan_report.c:118 __msan_warning+0x58/0xa0 mm/kmsan/kmsan_instr.c:215 caif_seqpkt_sendmsg+0x693/0xf60 net/caif/caif_socket.c:542 sock_sendmsg_nosec net/socket.c:652 [inline] sock_sendmsg net/socket.c:672 [inline] ____sys_sendmsg+0x12b6/0x1350 net/socket.c:2343 ___sys_sendmsg net/socket.c:2397 [inline] __sys_sendmmsg+0x808/0xc90 net/socket.c:2480 __compat_sys_sendmmsg net/compat.c:656 [inline]
AI Analysis
Technical Summary
CVE-2021-47297 is a medium-severity vulnerability in the Linux kernel affecting the CAIF (Cellular Interface) network protocol implementation, specifically in the caif_seqpkt_sendmsg function. The issue arises due to the use of uninitialized stack memory when the number of segments (nr_segs) is zero in the iovec_from_user function. This leads to the msg->msg_iter.iov pointer being uninitialized, which is then dereferenced without proper validation in caif_seqpkt_sendmsg. The vulnerability is rooted in improper handling of message buffers during the sendmsg system call, potentially causing undefined behavior or kernel crashes. The kernel's Kernel Memory Sanitizer (KMSAN) detected this uninitialized value usage, indicating a memory safety flaw. Exploitation requires local privileges (PR:L), no user interaction (UI:N), and has a low attack complexity (AC:L). The impact is limited to availability (A:H), meaning an attacker with some privileges could cause a denial of service by crashing the kernel or causing instability, but confidentiality and integrity are not affected. The vulnerability does not appear to have known exploits in the wild as of the publication date. The affected versions correspond to specific Linux kernel commits identified by their hashes, indicating this is a recent fix. The vulnerability is relevant for systems using the CAIF protocol, which is primarily used in embedded or cellular communication contexts within Linux environments.
Potential Impact
For European organizations, the primary impact of CVE-2021-47297 is the potential for denial-of-service (DoS) conditions on Linux systems utilizing the CAIF protocol stack. This could affect embedded devices, network equipment, or cellular communication infrastructure running vulnerable Linux kernels. Organizations in telecommunications, critical infrastructure, and industries relying on embedded Linux devices may experience service disruptions or system instability. Since the vulnerability requires local privileges, the risk is higher in environments where untrusted users have some level of access or where privilege escalation chains exist. The lack of impact on confidentiality and integrity reduces the risk of data breaches but does not eliminate operational risks. European telecom providers and industrial control systems using Linux-based cellular interfaces could be particularly sensitive to this vulnerability, as service availability is critical. Additionally, any disruption in embedded systems within manufacturing or transportation sectors could have cascading effects on operational continuity.
Mitigation Recommendations
To mitigate CVE-2021-47297, European organizations should: 1) Apply the latest Linux kernel patches that address this vulnerability as soon as they become available, ensuring that the CAIF protocol implementation is updated. 2) Audit and restrict local user privileges to minimize the risk of exploitation by unprivileged users. 3) Implement strict access controls and monitoring on systems running embedded or cellular Linux stacks to detect abnormal behavior or crashes related to sendmsg system calls. 4) For embedded devices, coordinate with vendors to obtain firmware updates incorporating the patched kernel versions. 5) Employ kernel hardening techniques such as Kernel Address Sanitizer (KASAN) and Kernel Memory Sanitizer (KMSAN) during development and testing phases to detect similar issues proactively. 6) Conduct regular security assessments of embedded Linux systems, focusing on network protocol stacks and local privilege boundaries. 7) Consider network segmentation to isolate vulnerable devices and limit the impact of potential DoS conditions.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland
CVE-2021-47297: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: fix uninit-value in caif_seqpkt_sendmsg When nr_segs equal to zero in iovec_from_user, the object msg->msg_iter.iov is uninit stack memory in caif_seqpkt_sendmsg which is defined in ___sys_sendmsg. So we cann't just judge msg->msg_iter.iov->base directlly. We can use nr_segs to judge msg in caif_seqpkt_sendmsg whether has data buffers. ===================================================== BUG: KMSAN: uninit-value in caif_seqpkt_sendmsg+0x693/0xf60 net/caif/caif_socket.c:542 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c9/0x220 lib/dump_stack.c:118 kmsan_report+0xf7/0x1e0 mm/kmsan/kmsan_report.c:118 __msan_warning+0x58/0xa0 mm/kmsan/kmsan_instr.c:215 caif_seqpkt_sendmsg+0x693/0xf60 net/caif/caif_socket.c:542 sock_sendmsg_nosec net/socket.c:652 [inline] sock_sendmsg net/socket.c:672 [inline] ____sys_sendmsg+0x12b6/0x1350 net/socket.c:2343 ___sys_sendmsg net/socket.c:2397 [inline] __sys_sendmmsg+0x808/0xc90 net/socket.c:2480 __compat_sys_sendmmsg net/compat.c:656 [inline]
AI-Powered Analysis
Technical Analysis
CVE-2021-47297 is a medium-severity vulnerability in the Linux kernel affecting the CAIF (Cellular Interface) network protocol implementation, specifically in the caif_seqpkt_sendmsg function. The issue arises due to the use of uninitialized stack memory when the number of segments (nr_segs) is zero in the iovec_from_user function. This leads to the msg->msg_iter.iov pointer being uninitialized, which is then dereferenced without proper validation in caif_seqpkt_sendmsg. The vulnerability is rooted in improper handling of message buffers during the sendmsg system call, potentially causing undefined behavior or kernel crashes. The kernel's Kernel Memory Sanitizer (KMSAN) detected this uninitialized value usage, indicating a memory safety flaw. Exploitation requires local privileges (PR:L), no user interaction (UI:N), and has a low attack complexity (AC:L). The impact is limited to availability (A:H), meaning an attacker with some privileges could cause a denial of service by crashing the kernel or causing instability, but confidentiality and integrity are not affected. The vulnerability does not appear to have known exploits in the wild as of the publication date. The affected versions correspond to specific Linux kernel commits identified by their hashes, indicating this is a recent fix. The vulnerability is relevant for systems using the CAIF protocol, which is primarily used in embedded or cellular communication contexts within Linux environments.
Potential Impact
For European organizations, the primary impact of CVE-2021-47297 is the potential for denial-of-service (DoS) conditions on Linux systems utilizing the CAIF protocol stack. This could affect embedded devices, network equipment, or cellular communication infrastructure running vulnerable Linux kernels. Organizations in telecommunications, critical infrastructure, and industries relying on embedded Linux devices may experience service disruptions or system instability. Since the vulnerability requires local privileges, the risk is higher in environments where untrusted users have some level of access or where privilege escalation chains exist. The lack of impact on confidentiality and integrity reduces the risk of data breaches but does not eliminate operational risks. European telecom providers and industrial control systems using Linux-based cellular interfaces could be particularly sensitive to this vulnerability, as service availability is critical. Additionally, any disruption in embedded systems within manufacturing or transportation sectors could have cascading effects on operational continuity.
Mitigation Recommendations
To mitigate CVE-2021-47297, European organizations should: 1) Apply the latest Linux kernel patches that address this vulnerability as soon as they become available, ensuring that the CAIF protocol implementation is updated. 2) Audit and restrict local user privileges to minimize the risk of exploitation by unprivileged users. 3) Implement strict access controls and monitoring on systems running embedded or cellular Linux stacks to detect abnormal behavior or crashes related to sendmsg system calls. 4) For embedded devices, coordinate with vendors to obtain firmware updates incorporating the patched kernel versions. 5) Employ kernel hardening techniques such as Kernel Address Sanitizer (KASAN) and Kernel Memory Sanitizer (KMSAN) during development and testing phases to detect similar issues proactively. 6) Conduct regular security assessments of embedded Linux systems, focusing on network protocol stacks and local privilege boundaries. 7) Consider network segmentation to isolate vulnerable devices and limit the impact of potential DoS conditions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-21T13:27:52.132Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9835c4522896dcbea34a
Added to database: 5/21/2025, 9:09:09 AM
Last enriched: 6/26/2025, 11:09:20 AM
Last updated: 8/18/2025, 11:34:55 PM
Views: 19
Related Threats
CVE-2025-55581: n/a
UnknownCVE-2025-52085: n/a
UnknownCVE-2025-43760: CWE-79: Cross-site Scripting in Liferay Portal
MediumCVE-2025-55613: n/a
HighCVE-2025-57800: CWE-523: Unprotected Transport of Credentials in advplyr audiobookshelf
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.