CVE-2021-46973

8.4 HIGH

📋 TL;DR

This is a use-after-free vulnerability in the Linux kernel's Qualcomm IPC Router (QRTR) subsystem when used with MHI (Modem Host Interface). It allows an attacker to potentially execute arbitrary code or cause denial of service by exploiting improper skb (socket buffer) handling. Systems running vulnerable Linux kernel versions with QRTR enabled are affected.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific versions between initial QRTR MHI support and fixes in stable branches (check git commits for exact ranges)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if QRTR subsystem with MHI support is enabled and used. Many distributions may not have this enabled by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel-level code execution, potentially leading to full system compromise.

🟠

Likely Case

Kernel panic or system crash causing denial of service.

🟢

If Mitigated

Limited impact if QRTR subsystem is disabled or not in use.

🌐 Internet-Facing: LOW - Requires local access or ability to interact with QRTR subsystem.
🏢 Internal Only: MEDIUM - Could be exploited by malicious local users or through other vulnerabilities.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to interact with QRTR subsystem. No public exploits known as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in stable kernel versions via commits referenced in CVE

Vendor Advisory: https://git.kernel.org/stable/c/03c649dee8b1eb5600212a249542a70f47a5ab40

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Disable QRTR subsystem

linux

Disable the vulnerable QRTR subsystem if not required

echo 'blacklist qrtr' > /etc/modprobe.d/qrtr-blacklist.conf
rmmod qrtr

🧯 If You Can't Patch

  • Restrict local user access to systems
  • Disable QRTR subsystem if not required for functionality

🔍 How to Verify

Check if Vulnerable:

Check if QRTR module is loaded: lsmod | grep qrtr. Check kernel version against affected ranges.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated to patched version and QRTR module version if loaded.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Oops messages related to QRTR or skb handling

Network Indicators:

  • Unusual QRTR protocol activity if monitored

SIEM Query:

kernel: *Oops* OR kernel: *panic* AND (qrtr OR skb)

🔗 References

📤 Share & Export