CVE-2021-47165: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/meson: fix shutdown crash when component not probed When main component is not probed, by example when the dw-hdmi module is not loaded yet or in probe defer, the following crash appears on shutdown: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000038 ... pc : meson_drv_shutdown+0x24/0x50 lr : platform_drv_shutdown+0x20/0x30 ... Call trace: meson_drv_shutdown+0x24/0x50 platform_drv_shutdown+0x20/0x30 device_shutdown+0x158/0x360 kernel_restart_prepare+0x38/0x48 kernel_restart+0x18/0x68 __do_sys_reboot+0x224/0x250 __arm64_sys_reboot+0x24/0x30 ... Simply check if the priv struct has been allocated before using it.
AI Analysis
Technical Summary
CVE-2021-47165 is a vulnerability identified in the Linux kernel specifically within the Direct Rendering Manager (DRM) subsystem for Meson platforms. The issue arises in the shutdown sequence of the drm/meson driver when the main component, such as the dw-hdmi module, has not been probed or loaded yet, or is in a probe defer state. During system shutdown or reboot, the driver attempts to access a private data structure (priv struct) without verifying its allocation, leading to a NULL pointer dereference at a low virtual memory address (0x38). This results in a kernel crash, as evidenced by the call trace involving meson_drv_shutdown and platform_drv_shutdown functions. The root cause is the lack of a null check before using the priv struct during shutdown. The fix involves adding a check to ensure the priv struct is allocated before it is accessed, preventing the kernel from dereferencing a NULL pointer and crashing. This vulnerability affects certain Linux kernel versions identified by specific commit hashes, and it is related to ARM64 architecture platforms using the Meson DRM driver. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2021-47165 primarily concerns systems running Linux kernels with the affected Meson DRM driver, which is common in embedded devices, ARM64-based platforms, and potentially some IoT devices. The vulnerability causes a denial of service (DoS) condition by crashing the kernel during shutdown or reboot sequences. This can lead to system instability, unexpected downtime, and potential disruption of critical services relying on affected devices. While the vulnerability does not appear to allow privilege escalation or remote code execution, the forced kernel crash can interrupt operations, especially in environments where uptime and reliability are critical, such as industrial control systems, telecommunications infrastructure, and embedded systems used in automotive or medical devices. European organizations deploying ARM64 Linux-based devices should be aware of this risk, as it could affect device lifecycle management and maintenance procedures. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or malicious triggering of the crash.
Mitigation Recommendations
To mitigate CVE-2021-47165, organizations should: 1) Apply the latest Linux kernel patches that include the fix for this vulnerability, ensuring the Meson DRM driver properly checks for the allocation of the priv struct before accessing it during shutdown. 2) For embedded and ARM64-based devices, coordinate with hardware and software vendors to obtain updated firmware or kernel versions incorporating the fix. 3) Implement robust shutdown and reboot procedures that minimize the risk of triggering the vulnerability, such as ensuring dependent modules are properly loaded or unloaded in the correct order. 4) Monitor system logs for kernel crashes related to drm/meson or platform_drv_shutdown to detect potential occurrences of this issue. 5) In environments where patching is delayed, consider isolating affected devices or limiting their exposure to reduce the risk of accidental shutdown crashes. 6) Maintain an inventory of devices running affected Linux kernel versions to prioritize patching and risk assessment. These steps go beyond generic advice by focusing on the specific driver and platform affected and emphasizing operational controls alongside patch management.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy
CVE-2021-47165: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/meson: fix shutdown crash when component not probed When main component is not probed, by example when the dw-hdmi module is not loaded yet or in probe defer, the following crash appears on shutdown: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000038 ... pc : meson_drv_shutdown+0x24/0x50 lr : platform_drv_shutdown+0x20/0x30 ... Call trace: meson_drv_shutdown+0x24/0x50 platform_drv_shutdown+0x20/0x30 device_shutdown+0x158/0x360 kernel_restart_prepare+0x38/0x48 kernel_restart+0x18/0x68 __do_sys_reboot+0x224/0x250 __arm64_sys_reboot+0x24/0x30 ... Simply check if the priv struct has been allocated before using it.
AI-Powered Analysis
Technical Analysis
CVE-2021-47165 is a vulnerability identified in the Linux kernel specifically within the Direct Rendering Manager (DRM) subsystem for Meson platforms. The issue arises in the shutdown sequence of the drm/meson driver when the main component, such as the dw-hdmi module, has not been probed or loaded yet, or is in a probe defer state. During system shutdown or reboot, the driver attempts to access a private data structure (priv struct) without verifying its allocation, leading to a NULL pointer dereference at a low virtual memory address (0x38). This results in a kernel crash, as evidenced by the call trace involving meson_drv_shutdown and platform_drv_shutdown functions. The root cause is the lack of a null check before using the priv struct during shutdown. The fix involves adding a check to ensure the priv struct is allocated before it is accessed, preventing the kernel from dereferencing a NULL pointer and crashing. This vulnerability affects certain Linux kernel versions identified by specific commit hashes, and it is related to ARM64 architecture platforms using the Meson DRM driver. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2021-47165 primarily concerns systems running Linux kernels with the affected Meson DRM driver, which is common in embedded devices, ARM64-based platforms, and potentially some IoT devices. The vulnerability causes a denial of service (DoS) condition by crashing the kernel during shutdown or reboot sequences. This can lead to system instability, unexpected downtime, and potential disruption of critical services relying on affected devices. While the vulnerability does not appear to allow privilege escalation or remote code execution, the forced kernel crash can interrupt operations, especially in environments where uptime and reliability are critical, such as industrial control systems, telecommunications infrastructure, and embedded systems used in automotive or medical devices. European organizations deploying ARM64 Linux-based devices should be aware of this risk, as it could affect device lifecycle management and maintenance procedures. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or malicious triggering of the crash.
Mitigation Recommendations
To mitigate CVE-2021-47165, organizations should: 1) Apply the latest Linux kernel patches that include the fix for this vulnerability, ensuring the Meson DRM driver properly checks for the allocation of the priv struct before accessing it during shutdown. 2) For embedded and ARM64-based devices, coordinate with hardware and software vendors to obtain updated firmware or kernel versions incorporating the fix. 3) Implement robust shutdown and reboot procedures that minimize the risk of triggering the vulnerability, such as ensuring dependent modules are properly loaded or unloaded in the correct order. 4) Monitor system logs for kernel crashes related to drm/meson or platform_drv_shutdown to detect potential occurrences of this issue. 5) In environments where patching is delayed, consider isolating affected devices or limiting their exposure to reduce the risk of accidental shutdown crashes. 6) Maintain an inventory of devices running affected Linux kernel versions to prioritize patching and risk assessment. These steps go beyond generic advice by focusing on the specific driver and platform affected and emphasizing operational controls alongside patch management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-03-25T09:12:14.110Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9822c4522896dcbde06d
Added to database: 5/21/2025, 9:08:50 AM
Last enriched: 6/28/2025, 4:56:19 AM
Last updated: 8/11/2025, 3:10:05 AM
Views: 10
Related Threats
CVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumCVE-2025-8482: CWE-862 Missing Authorization in 10up Simple Local Avatars
MediumCVE-2025-8418: CWE-862 Missing Authorization in bplugins B Slider- Gutenberg Slider Block for WP
HighCVE-2025-47444: CWE-201 Insertion of Sensitive Information Into Sent Data in Liquid Web GiveWP
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.