CVE-2021-47048

7.8 HIGH

📋 TL;DR

This CVE describes a use-after-free vulnerability in the Linux kernel's SPI driver for ZynqMP GQSPI controllers. An attacker could exploit this to cause kernel memory corruption, potentially leading to system crashes or arbitrary code execution with kernel privileges. Systems running affected Linux kernel versions with the spi-zynqmp-gqspi driver loaded are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected kernel versions not explicitly stated in CVE description; check git commits for exact ranges.
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if the spi-zynqmp-gqspi driver is loaded and used (typically on Xilinx Zynq UltraScale+ MPSoC platforms).

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel privilege escalation leading to full system compromise, denial of service, or arbitrary code execution with kernel privileges.

🟠

Likely Case

System crash or kernel panic resulting in denial of service, requiring physical or remote reboot.

🟢

If Mitigated

No impact if the vulnerable driver is not loaded or the system is patched.

🌐 Internet-Facing: LOW - Requires local access or ability to trigger SPI operations remotely through other services.
🏢 Internal Only: MEDIUM - Local attackers or malicious users could exploit this to escalate privileges or cause denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering specific SPI operations through the vulnerable driver, typically requiring local access or ability to interact with SPI devices.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check specific kernel versions in provided git commit references

Vendor Advisory: https://git.kernel.org/stable/c/1231279389b5e638bc3b66b9741c94077aed4b5a

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Reboot system to load new kernel. 3. Verify driver is updated.

🔧 Temporary Workarounds

Disable vulnerable driver

linux

Prevent loading of spi-zynqmp-gqspi driver if not required

echo 'blacklist spi-zynqmp-gqspi' >> /etc/modprobe.d/blacklist.conf
rmmod spi-zynqmp-gqspi

🧯 If You Can't Patch

  • Restrict local access to prevent unauthorized users from triggering SPI operations
  • Implement strict access controls and monitoring for SPI device interactions

🔍 How to Verify

Check if Vulnerable:

Check if spi-zynqmp-gqspi driver is loaded: lsmod | grep spi-zynqmp-gqspi

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched and driver version matches fixed commits

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • KASAN use-after-free warnings in dmesg
  • SPI operation failures

Network Indicators:

  • None - local vulnerability

SIEM Query:

Search for kernel panic events or use-after-free warnings in system logs

🔗 References

📤 Share & Export