CVE-2021-28375
📋 TL;DR
This vulnerability in the Linux kernel allows user applications to send kernel RPC messages through the fastrpc driver, bypassing intended access controls. It affects Linux systems with kernel versions up to 5.11.6 that use the fastrpc driver. This is a privilege escalation vulnerability that could allow local attackers to gain elevated privileges.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Fedora by Fedoraproject
Fedora by Fedoraproject
Fedora by Fedoraproject
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Local attacker gains root privileges, leading to complete system compromise, data theft, or installation of persistent malware.
Likely Case
Local user escalates privileges to gain unauthorized access to sensitive system resources or other user data.
If Mitigated
Attack fails due to proper access controls, SELinux/AppArmor policies, or lack of local access.
🎯 Exploit Status
Exploitation requires local access and knowledge of the fastrpc interface. This is related to CVE-2019-2308 which had similar exploitation patterns.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Linux kernel 5.11.7 and later
Vendor Advisory: https://git.kernel.org/linus/20c40794eb85ea29852d7bc37c55713802a543d6
Restart Required: Yes
Instructions:
1. Update Linux kernel to version 5.11.7 or later. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable fastrpc module
linuxPrevent loading of the vulnerable fastrpc driver module
echo 'blacklist fastrpc' > /etc/modprobe.d/fastrpc-blacklist.conf
rmmod fastrpc
Restrict module loading
linuxPrevent unauthorized loading of kernel modules
echo 'kernel.modules_disabled=1' >> /etc/sysctl.conf
sysctl -p
🧯 If You Can't Patch
- Implement strict access controls to prevent local users from executing arbitrary code
- Use SELinux or AppArmor to restrict fastrpc driver access and contain potential privilege escalation
🔍 How to Verify
Check if Vulnerable:
Check kernel version: uname -r. If version is 5.11.6 or earlier, check if fastrpc module is loaded: lsmod | grep fastrpc
Check Version:
uname -r
Verify Fix Applied:
After update, verify kernel version is 5.11.7 or later: uname -r
📡 Detection & Monitoring
Log Indicators:
- Unusual fastrpc driver activity in kernel logs
- Failed module loading attempts for fastrpc
- Unexpected privilege escalation events
Network Indicators:
- None - this is a local vulnerability
SIEM Query:
source="kernel" AND ("fastrpc" OR "RPC message" OR "privilege escalation")
🔗 References
- https://git.kernel.org/linus/20c40794eb85ea29852d7bc37c55713802a543d6
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OMRQVOTASD3VZP6GE4JJHE27QU6FHTZ6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TJPVQZPY3DHPV5I3IVNMSMO6D3PKZISX/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XAUNYDTGE6MB4NWL2SIHPCODCLET3JZB/
- https://lore.kernel.org/stable/YD03ew7+6v0XPh6l%40kroah.com/
- https://security.netapp.com/advisory/ntap-20210401-0003/
- https://git.kernel.org/linus/20c40794eb85ea29852d7bc37c55713802a543d6
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OMRQVOTASD3VZP6GE4JJHE27QU6FHTZ6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TJPVQZPY3DHPV5I3IVNMSMO6D3PKZISX/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XAUNYDTGE6MB4NWL2SIHPCODCLET3JZB/
- https://lore.kernel.org/stable/YD03ew7+6v0XPh6l%40kroah.com/
- https://security.netapp.com/advisory/ntap-20210401-0003/