CVE-2021-47373

5.5 MEDIUM

📋 TL;DR

This CVE describes an off-by-one error in the Linux kernel's GIC-V3 interrupt controller that could cause a memory leak when virtual CPU (VPE) allocation fails. The vulnerability affects Linux systems using the GIC-V3 interrupt controller, potentially leading to resource exhaustion. This impacts Linux servers, embedded systems, and virtualized environments using affected kernel versions.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Specific affected versions not explicitly stated in CVE, but patches available for multiple stable branches
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using GIC-V3 interrupt controller (common on ARM64/AArch64 systems). Virtualized environments may be particularly affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained exploitation could lead to kernel memory exhaustion, causing system instability, denial of service, or potential kernel crashes.

🟠

Likely Case

Intermittent system instability or performance degradation due to memory fragmentation and resource exhaustion over time.

🟢

If Mitigated

Minimal impact with proper monitoring and resource limits in place, though potential for occasional allocation failures.

🌐 Internet-Facing: LOW - This is a kernel-level vulnerability requiring local access or ability to trigger specific interrupt controller operations.
🏢 Internal Only: MEDIUM - Malicious local users or compromised services could potentially trigger this vulnerability to degrade system performance.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to trigger VPE allocation failures, which may require specific conditions or privileged access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple stable kernel versions with fixes (see references)

Vendor Advisory: https://git.kernel.org/stable/c/280bef512933b2dda01d681d8cbe499b98fc5bdd

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution's repositories. 2. For custom kernels, apply the fix from kernel.org stable branches. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Limit VPE allocations

linux

Configure system to limit virtual CPU allocations if possible in your environment

🧯 If You Can't Patch

  • Implement strict resource monitoring and alerting for memory usage
  • Isolate affected systems and limit user/process access to interrupt controller operations

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if GIC-V3 is in use: 'uname -r' and check /proc/interrupts or system logs for GIC-V3

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated to patched version and monitor system stability during VPE operations

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages
  • Memory allocation failures in kernel logs
  • Interrupt controller errors

SIEM Query:

source="kernel" AND ("GIC" OR "VPE" OR "irqchip") AND ("error" OR "fail" OR "panic")

🔗 References

📤 Share & Export