CVE-2021-47175
📋 TL;DR
This is an out-of-bounds memory access vulnerability in the Linux kernel's fq_pie network scheduler. It allows attackers with local access to cause kernel crashes or potentially execute arbitrary code. Any Linux system using the fq_pie queuing discipline is affected.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash, or potential privilege escalation to kernel-level code execution.
Likely Case
Kernel crash causing denial of service, system instability, or information disclosure through memory leaks.
If Mitigated
Limited to denial of service if proper kernel hardening and memory protections are in place.
🎯 Exploit Status
The provided script demonstrates exploitation. Requires CAP_NET_ADMIN or root privileges to configure network queuing.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions with commits 7a1bdec12e43e29cc34a4394590337069d8812ce or e6294c06e7c62ffdd5bf3df696d3a4fcbb753d3c
Vendor Advisory: https://git.kernel.org/stable/c/7a1bdec12e43e29cc34a4394590337069d8812ce
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution. 2. Reboot system to load new kernel. 3. Verify kernel version with 'uname -r'.
🔧 Temporary Workarounds
Disable fq_pie queuing discipline
linuxRemove or avoid using fq_pie qdisc configuration
# tc qdisc del dev eth0 root
# Remove any fq_pie configurations from network scripts
🧯 If You Can't Patch
- Restrict CAP_NET_ADMIN capabilities to trusted users only
- Implement kernel hardening features like KASAN and memory protection
🔍 How to Verify
Check if Vulnerable:
Check if fq_pie module is loaded: 'lsmod | grep fq_pie' and check kernel version
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is patched and test with the exploit script to confirm no crash
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- KASAN reports in dmesg
- System crash/reboot events
Network Indicators:
- Unexpected tc qdisc configurations
- Network interface errors
SIEM Query:
source="kernel" AND ("KASAN" OR "slab-out-of-bounds" OR "fq_pie")
🔗 References
- https://git.kernel.org/stable/c/7a1bdec12e43e29cc34a4394590337069d8812ce
- https://git.kernel.org/stable/c/e6294c06e7c62ffdd5bf3df696d3a4fcbb753d3c
- https://git.kernel.org/stable/c/e70f7a11876a1a788ceadf75e9e5f7af2c868680
- https://git.kernel.org/stable/c/7a1bdec12e43e29cc34a4394590337069d8812ce
- https://git.kernel.org/stable/c/e6294c06e7c62ffdd5bf3df696d3a4fcbb753d3c
- https://git.kernel.org/stable/c/e70f7a11876a1a788ceadf75e9e5f7af2c868680