Skip to main content

CVE-2021-47073: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47073cvecve-2021-47073
Published: Fri Mar 01 2024 (03/01/2024, 21:15:11 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios init_dell_smbios_wmi() only registers the dell_smbios_wmi_driver on systems where the Dell WMI interface is supported. While exit_dell_smbios_wmi() unregisters it unconditionally, this leads to the following oops: [ 175.722921] ------------[ cut here ]------------ [ 175.722925] Unexpected driver unregister! [ 175.722939] WARNING: CPU: 1 PID: 3630 at drivers/base/driver.c:194 driver_unregister+0x38/0x40 ... [ 175.723089] Call Trace: [ 175.723094] cleanup_module+0x5/0xedd [dell_smbios] ... [ 175.723148] ---[ end trace 064c34e1ad49509d ]--- Make the unregister happen on the same condition the register happens to fix this.

AI-Powered Analysis

AILast updated: 06/30/2025, 20:56:33 UTC

Technical Analysis

CVE-2021-47073 is a vulnerability identified in the Linux kernel specifically related to the Dell SMBIOS WMI driver module (dell_smbios_wmi) on x86 platforms. The issue arises from improper handling of the registration and unregistration of the driver. The initialization function init_dell_smbios_wmi() conditionally registers the dell_smbios_wmi_driver only on systems that support the Dell WMI interface. However, the exit function exit_dell_smbios_wmi() unconditionally unregisters the driver regardless of whether it was registered. This mismatch leads to a kernel oops (crash) when the driver_unregister function is called on a driver that was never registered. The oops manifests as an unexpected driver unregister warning and a stack trace indicating a failure in the driver cleanup process. This flaw can cause system instability or crashes when the dell_smbios kernel module is removed (rmmod), potentially leading to denial of service (DoS) conditions. The vulnerability does not appear to allow privilege escalation or arbitrary code execution directly, but the kernel crash can disrupt normal operations. The patch involves ensuring that the unregister call only occurs if the driver was registered, thus preventing the oops. No known exploits are reported in the wild, and the vulnerability affects Linux kernel versions containing the faulty commit identified by the provided hashes. The vulnerability is specific to Dell systems with the WMI interface supported and running affected Linux kernel versions.

Potential Impact

For European organizations, the primary impact of CVE-2021-47073 is potential system instability or denial of service on Dell hardware running affected Linux kernel versions. Organizations relying on Dell x86 systems with Linux, particularly servers or workstations where kernel modules might be dynamically loaded or unloaded, could experience unexpected crashes during module removal operations. This could disrupt critical services or workflows, especially in environments that perform kernel module management as part of maintenance or updates. While the vulnerability does not directly lead to data breaches or privilege escalation, the resulting system crashes could cause downtime, loss of availability, and operational disruption. In sectors such as finance, healthcare, manufacturing, or government within Europe, where uptime and system reliability are critical, this vulnerability could have a tangible operational impact if exploited or triggered inadvertently. However, the lack of known exploits and the requirement for specific hardware and kernel conditions somewhat limit the scope of impact. Organizations using Dell hardware with Linux should assess their exposure and patch accordingly to maintain system stability.

Mitigation Recommendations

To mitigate CVE-2021-47073, European organizations should: 1) Identify all Dell x86 systems running Linux kernels that include the vulnerable dell_smbios_wmi driver. 2) Apply the latest Linux kernel updates or patches that fix this vulnerability, ensuring that the unregister logic matches the register condition. 3) Avoid manually removing the dell_smbios kernel module (rmmod) on affected systems until patched, as this triggers the oops. 4) Implement monitoring for kernel oops or crashes related to driver_unregister events to detect potential triggering of this vulnerability. 5) In environments where kernel module unloading is automated, review and adjust scripts or processes to prevent unloading the dell_smbios module on unsupported systems. 6) Test kernel updates in staging environments with Dell hardware to confirm the fix and prevent unintended downtime. 7) Maintain an inventory of hardware and kernel versions to quickly identify vulnerable systems. These steps go beyond generic advice by focusing on hardware-specific conditions and operational practices around kernel module management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-29T22:33:44.297Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9834c4522896dcbe9c37

Added to database: 5/21/2025, 9:09:08 AM

Last enriched: 6/30/2025, 8:56:33 PM

Last updated: 8/7/2025, 10:12:03 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats