CVE-2021-47073: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios init_dell_smbios_wmi() only registers the dell_smbios_wmi_driver on systems where the Dell WMI interface is supported. While exit_dell_smbios_wmi() unregisters it unconditionally, this leads to the following oops: [ 175.722921] ------------[ cut here ]------------ [ 175.722925] Unexpected driver unregister! [ 175.722939] WARNING: CPU: 1 PID: 3630 at drivers/base/driver.c:194 driver_unregister+0x38/0x40 ... [ 175.723089] Call Trace: [ 175.723094] cleanup_module+0x5/0xedd [dell_smbios] ... [ 175.723148] ---[ end trace 064c34e1ad49509d ]--- Make the unregister happen on the same condition the register happens to fix this.
AI Analysis
Technical Summary
CVE-2021-47073 is a vulnerability identified in the Linux kernel specifically related to the Dell SMBIOS WMI driver module (dell_smbios_wmi) on x86 platforms. The issue arises from improper handling of the registration and unregistration of the driver. The initialization function init_dell_smbios_wmi() conditionally registers the dell_smbios_wmi_driver only on systems that support the Dell WMI interface. However, the exit function exit_dell_smbios_wmi() unconditionally unregisters the driver regardless of whether it was registered. This mismatch leads to a kernel oops (crash) when the driver_unregister function is called on a driver that was never registered. The oops manifests as an unexpected driver unregister warning and a stack trace indicating a failure in the driver cleanup process. This flaw can cause system instability or crashes when the dell_smbios kernel module is removed (rmmod), potentially leading to denial of service (DoS) conditions. The vulnerability does not appear to allow privilege escalation or arbitrary code execution directly, but the kernel crash can disrupt normal operations. The patch involves ensuring that the unregister call only occurs if the driver was registered, thus preventing the oops. No known exploits are reported in the wild, and the vulnerability affects Linux kernel versions containing the faulty commit identified by the provided hashes. The vulnerability is specific to Dell systems with the WMI interface supported and running affected Linux kernel versions.
Potential Impact
For European organizations, the primary impact of CVE-2021-47073 is potential system instability or denial of service on Dell hardware running affected Linux kernel versions. Organizations relying on Dell x86 systems with Linux, particularly servers or workstations where kernel modules might be dynamically loaded or unloaded, could experience unexpected crashes during module removal operations. This could disrupt critical services or workflows, especially in environments that perform kernel module management as part of maintenance or updates. While the vulnerability does not directly lead to data breaches or privilege escalation, the resulting system crashes could cause downtime, loss of availability, and operational disruption. In sectors such as finance, healthcare, manufacturing, or government within Europe, where uptime and system reliability are critical, this vulnerability could have a tangible operational impact if exploited or triggered inadvertently. However, the lack of known exploits and the requirement for specific hardware and kernel conditions somewhat limit the scope of impact. Organizations using Dell hardware with Linux should assess their exposure and patch accordingly to maintain system stability.
Mitigation Recommendations
To mitigate CVE-2021-47073, European organizations should: 1) Identify all Dell x86 systems running Linux kernels that include the vulnerable dell_smbios_wmi driver. 2) Apply the latest Linux kernel updates or patches that fix this vulnerability, ensuring that the unregister logic matches the register condition. 3) Avoid manually removing the dell_smbios kernel module (rmmod) on affected systems until patched, as this triggers the oops. 4) Implement monitoring for kernel oops or crashes related to driver_unregister events to detect potential triggering of this vulnerability. 5) In environments where kernel module unloading is automated, review and adjust scripts or processes to prevent unloading the dell_smbios module on unsupported systems. 6) Test kernel updates in staging environments with Dell hardware to confirm the fix and prevent unintended downtime. 7) Maintain an inventory of hardware and kernel versions to quickly identify vulnerable systems. These steps go beyond generic advice by focusing on hardware-specific conditions and operational practices around kernel module management.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2021-47073: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios init_dell_smbios_wmi() only registers the dell_smbios_wmi_driver on systems where the Dell WMI interface is supported. While exit_dell_smbios_wmi() unregisters it unconditionally, this leads to the following oops: [ 175.722921] ------------[ cut here ]------------ [ 175.722925] Unexpected driver unregister! [ 175.722939] WARNING: CPU: 1 PID: 3630 at drivers/base/driver.c:194 driver_unregister+0x38/0x40 ... [ 175.723089] Call Trace: [ 175.723094] cleanup_module+0x5/0xedd [dell_smbios] ... [ 175.723148] ---[ end trace 064c34e1ad49509d ]--- Make the unregister happen on the same condition the register happens to fix this.
AI-Powered Analysis
Technical Analysis
CVE-2021-47073 is a vulnerability identified in the Linux kernel specifically related to the Dell SMBIOS WMI driver module (dell_smbios_wmi) on x86 platforms. The issue arises from improper handling of the registration and unregistration of the driver. The initialization function init_dell_smbios_wmi() conditionally registers the dell_smbios_wmi_driver only on systems that support the Dell WMI interface. However, the exit function exit_dell_smbios_wmi() unconditionally unregisters the driver regardless of whether it was registered. This mismatch leads to a kernel oops (crash) when the driver_unregister function is called on a driver that was never registered. The oops manifests as an unexpected driver unregister warning and a stack trace indicating a failure in the driver cleanup process. This flaw can cause system instability or crashes when the dell_smbios kernel module is removed (rmmod), potentially leading to denial of service (DoS) conditions. The vulnerability does not appear to allow privilege escalation or arbitrary code execution directly, but the kernel crash can disrupt normal operations. The patch involves ensuring that the unregister call only occurs if the driver was registered, thus preventing the oops. No known exploits are reported in the wild, and the vulnerability affects Linux kernel versions containing the faulty commit identified by the provided hashes. The vulnerability is specific to Dell systems with the WMI interface supported and running affected Linux kernel versions.
Potential Impact
For European organizations, the primary impact of CVE-2021-47073 is potential system instability or denial of service on Dell hardware running affected Linux kernel versions. Organizations relying on Dell x86 systems with Linux, particularly servers or workstations where kernel modules might be dynamically loaded or unloaded, could experience unexpected crashes during module removal operations. This could disrupt critical services or workflows, especially in environments that perform kernel module management as part of maintenance or updates. While the vulnerability does not directly lead to data breaches or privilege escalation, the resulting system crashes could cause downtime, loss of availability, and operational disruption. In sectors such as finance, healthcare, manufacturing, or government within Europe, where uptime and system reliability are critical, this vulnerability could have a tangible operational impact if exploited or triggered inadvertently. However, the lack of known exploits and the requirement for specific hardware and kernel conditions somewhat limit the scope of impact. Organizations using Dell hardware with Linux should assess their exposure and patch accordingly to maintain system stability.
Mitigation Recommendations
To mitigate CVE-2021-47073, European organizations should: 1) Identify all Dell x86 systems running Linux kernels that include the vulnerable dell_smbios_wmi driver. 2) Apply the latest Linux kernel updates or patches that fix this vulnerability, ensuring that the unregister logic matches the register condition. 3) Avoid manually removing the dell_smbios kernel module (rmmod) on affected systems until patched, as this triggers the oops. 4) Implement monitoring for kernel oops or crashes related to driver_unregister events to detect potential triggering of this vulnerability. 5) In environments where kernel module unloading is automated, review and adjust scripts or processes to prevent unloading the dell_smbios module on unsupported systems. 6) Test kernel updates in staging environments with Dell hardware to confirm the fix and prevent unintended downtime. 7) Maintain an inventory of hardware and kernel versions to quickly identify vulnerable systems. These steps go beyond generic advice by focusing on hardware-specific conditions and operational practices around kernel module management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-29T22:33:44.297Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9834c4522896dcbe9c37
Added to database: 5/21/2025, 9:09:08 AM
Last enriched: 6/30/2025, 8:56:33 PM
Last updated: 8/7/2025, 10:12:03 PM
Views: 14
Related Threats
CVE-2025-8452: CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory in Brother Industries, Ltd HL-L8260CDN
MediumCVE-2025-5468: CWE-61: UNIX Symbolic Link in Ivanti Connect Secure
MediumCVE-2025-5466: CWE-776 Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') in Ivanti Connect Secure
MediumCVE-2025-5456: CWE-125 Out-of-bounds Read in Ivanti Connect Secure
HighCVE-2025-3831: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor. in checkpoint Check Point Harmony SASE
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.