Skip to main content

CVE-2021-47165: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47165cvecve-2021-47165
Published: Mon Mar 25 2024 (03/25/2024, 09:16:18 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/meson: fix shutdown crash when component not probed When main component is not probed, by example when the dw-hdmi module is not loaded yet or in probe defer, the following crash appears on shutdown: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000038 ... pc : meson_drv_shutdown+0x24/0x50 lr : platform_drv_shutdown+0x20/0x30 ... Call trace: meson_drv_shutdown+0x24/0x50 platform_drv_shutdown+0x20/0x30 device_shutdown+0x158/0x360 kernel_restart_prepare+0x38/0x48 kernel_restart+0x18/0x68 __do_sys_reboot+0x224/0x250 __arm64_sys_reboot+0x24/0x30 ... Simply check if the priv struct has been allocated before using it.

AI-Powered Analysis

AILast updated: 06/28/2025, 04:56:19 UTC

Technical Analysis

CVE-2021-47165 is a vulnerability identified in the Linux kernel specifically within the Direct Rendering Manager (DRM) subsystem for Meson platforms. The issue arises in the shutdown sequence of the drm/meson driver when the main component, such as the dw-hdmi module, has not been probed or loaded yet, or is in a probe defer state. During system shutdown or reboot, the driver attempts to access a private data structure (priv struct) without verifying its allocation, leading to a NULL pointer dereference at a low virtual memory address (0x38). This results in a kernel crash, as evidenced by the call trace involving meson_drv_shutdown and platform_drv_shutdown functions. The root cause is the lack of a null check before using the priv struct during shutdown. The fix involves adding a check to ensure the priv struct is allocated before it is accessed, preventing the kernel from dereferencing a NULL pointer and crashing. This vulnerability affects certain Linux kernel versions identified by specific commit hashes, and it is related to ARM64 architecture platforms using the Meson DRM driver. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2021-47165 primarily concerns systems running Linux kernels with the affected Meson DRM driver, which is common in embedded devices, ARM64-based platforms, and potentially some IoT devices. The vulnerability causes a denial of service (DoS) condition by crashing the kernel during shutdown or reboot sequences. This can lead to system instability, unexpected downtime, and potential disruption of critical services relying on affected devices. While the vulnerability does not appear to allow privilege escalation or remote code execution, the forced kernel crash can interrupt operations, especially in environments where uptime and reliability are critical, such as industrial control systems, telecommunications infrastructure, and embedded systems used in automotive or medical devices. European organizations deploying ARM64 Linux-based devices should be aware of this risk, as it could affect device lifecycle management and maintenance procedures. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or malicious triggering of the crash.

Mitigation Recommendations

To mitigate CVE-2021-47165, organizations should: 1) Apply the latest Linux kernel patches that include the fix for this vulnerability, ensuring the Meson DRM driver properly checks for the allocation of the priv struct before accessing it during shutdown. 2) For embedded and ARM64-based devices, coordinate with hardware and software vendors to obtain updated firmware or kernel versions incorporating the fix. 3) Implement robust shutdown and reboot procedures that minimize the risk of triggering the vulnerability, such as ensuring dependent modules are properly loaded or unloaded in the correct order. 4) Monitor system logs for kernel crashes related to drm/meson or platform_drv_shutdown to detect potential occurrences of this issue. 5) In environments where patching is delayed, consider isolating affected devices or limiting their exposure to reduce the risk of accidental shutdown crashes. 6) Maintain an inventory of devices running affected Linux kernel versions to prioritize patching and risk assessment. These steps go beyond generic advice by focusing on the specific driver and platform affected and emphasizing operational controls alongside patch management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-03-25T09:12:14.110Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9822c4522896dcbde06d

Added to database: 5/21/2025, 9:08:50 AM

Last enriched: 6/28/2025, 4:56:19 AM

Last updated: 8/11/2025, 3:10:05 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats