CVE-2021-47165: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/meson: fix shutdown crash when component not probed When main component is not probed, by example when the dw-hdmi module is not loaded yet or in probe defer, the following crash appears on shutdown: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000038 ... pc : meson_drv_shutdown+0x24/0x50 lr : platform_drv_shutdown+0x20/0x30 ... Call trace: meson_drv_shutdown+0x24/0x50 platform_drv_shutdown+0x20/0x30 device_shutdown+0x158/0x360 kernel_restart_prepare+0x38/0x48 kernel_restart+0x18/0x68 __do_sys_reboot+0x224/0x250 __arm64_sys_reboot+0x24/0x30 ... Simply check if the priv struct has been allocated before using it.
AI Analysis
Technical Summary
CVE-2021-47165 is a vulnerability identified in the Linux kernel specifically within the Direct Rendering Manager (DRM) subsystem for Meson platforms. The issue arises in the shutdown sequence of the drm/meson driver when the main component, such as the dw-hdmi module, has not been probed or loaded yet, or is in a probe defer state. During system shutdown or reboot, the driver attempts to access a private data structure (priv struct) without verifying its allocation, leading to a NULL pointer dereference at a low virtual memory address (0x38). This results in a kernel crash, as evidenced by the call trace involving meson_drv_shutdown and platform_drv_shutdown functions. The root cause is the lack of a null check before using the priv struct during shutdown. The fix involves adding a check to ensure the priv struct is allocated before it is accessed, preventing the kernel from dereferencing a NULL pointer and crashing. This vulnerability affects certain Linux kernel versions identified by specific commit hashes, and it is related to ARM64 architecture platforms using the Meson DRM driver. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2021-47165 primarily concerns systems running Linux kernels with the affected Meson DRM driver, which is common in embedded devices, ARM64-based platforms, and potentially some IoT devices. The vulnerability causes a denial of service (DoS) condition by crashing the kernel during shutdown or reboot sequences. This can lead to system instability, unexpected downtime, and potential disruption of critical services relying on affected devices. While the vulnerability does not appear to allow privilege escalation or remote code execution, the forced kernel crash can interrupt operations, especially in environments where uptime and reliability are critical, such as industrial control systems, telecommunications infrastructure, and embedded systems used in automotive or medical devices. European organizations deploying ARM64 Linux-based devices should be aware of this risk, as it could affect device lifecycle management and maintenance procedures. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or malicious triggering of the crash.
Mitigation Recommendations
To mitigate CVE-2021-47165, organizations should: 1) Apply the latest Linux kernel patches that include the fix for this vulnerability, ensuring the Meson DRM driver properly checks for the allocation of the priv struct before accessing it during shutdown. 2) For embedded and ARM64-based devices, coordinate with hardware and software vendors to obtain updated firmware or kernel versions incorporating the fix. 3) Implement robust shutdown and reboot procedures that minimize the risk of triggering the vulnerability, such as ensuring dependent modules are properly loaded or unloaded in the correct order. 4) Monitor system logs for kernel crashes related to drm/meson or platform_drv_shutdown to detect potential occurrences of this issue. 5) In environments where patching is delayed, consider isolating affected devices or limiting their exposure to reduce the risk of accidental shutdown crashes. 6) Maintain an inventory of devices running affected Linux kernel versions to prioritize patching and risk assessment. These steps go beyond generic advice by focusing on the specific driver and platform affected and emphasizing operational controls alongside patch management.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy
CVE-2021-47165: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/meson: fix shutdown crash when component not probed When main component is not probed, by example when the dw-hdmi module is not loaded yet or in probe defer, the following crash appears on shutdown: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000038 ... pc : meson_drv_shutdown+0x24/0x50 lr : platform_drv_shutdown+0x20/0x30 ... Call trace: meson_drv_shutdown+0x24/0x50 platform_drv_shutdown+0x20/0x30 device_shutdown+0x158/0x360 kernel_restart_prepare+0x38/0x48 kernel_restart+0x18/0x68 __do_sys_reboot+0x224/0x250 __arm64_sys_reboot+0x24/0x30 ... Simply check if the priv struct has been allocated before using it.
AI-Powered Analysis
Technical Analysis
CVE-2021-47165 is a vulnerability identified in the Linux kernel specifically within the Direct Rendering Manager (DRM) subsystem for Meson platforms. The issue arises in the shutdown sequence of the drm/meson driver when the main component, such as the dw-hdmi module, has not been probed or loaded yet, or is in a probe defer state. During system shutdown or reboot, the driver attempts to access a private data structure (priv struct) without verifying its allocation, leading to a NULL pointer dereference at a low virtual memory address (0x38). This results in a kernel crash, as evidenced by the call trace involving meson_drv_shutdown and platform_drv_shutdown functions. The root cause is the lack of a null check before using the priv struct during shutdown. The fix involves adding a check to ensure the priv struct is allocated before it is accessed, preventing the kernel from dereferencing a NULL pointer and crashing. This vulnerability affects certain Linux kernel versions identified by specific commit hashes, and it is related to ARM64 architecture platforms using the Meson DRM driver. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2021-47165 primarily concerns systems running Linux kernels with the affected Meson DRM driver, which is common in embedded devices, ARM64-based platforms, and potentially some IoT devices. The vulnerability causes a denial of service (DoS) condition by crashing the kernel during shutdown or reboot sequences. This can lead to system instability, unexpected downtime, and potential disruption of critical services relying on affected devices. While the vulnerability does not appear to allow privilege escalation or remote code execution, the forced kernel crash can interrupt operations, especially in environments where uptime and reliability are critical, such as industrial control systems, telecommunications infrastructure, and embedded systems used in automotive or medical devices. European organizations deploying ARM64 Linux-based devices should be aware of this risk, as it could affect device lifecycle management and maintenance procedures. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or malicious triggering of the crash.
Mitigation Recommendations
To mitigate CVE-2021-47165, organizations should: 1) Apply the latest Linux kernel patches that include the fix for this vulnerability, ensuring the Meson DRM driver properly checks for the allocation of the priv struct before accessing it during shutdown. 2) For embedded and ARM64-based devices, coordinate with hardware and software vendors to obtain updated firmware or kernel versions incorporating the fix. 3) Implement robust shutdown and reboot procedures that minimize the risk of triggering the vulnerability, such as ensuring dependent modules are properly loaded or unloaded in the correct order. 4) Monitor system logs for kernel crashes related to drm/meson or platform_drv_shutdown to detect potential occurrences of this issue. 5) In environments where patching is delayed, consider isolating affected devices or limiting their exposure to reduce the risk of accidental shutdown crashes. 6) Maintain an inventory of devices running affected Linux kernel versions to prioritize patching and risk assessment. These steps go beyond generic advice by focusing on the specific driver and platform affected and emphasizing operational controls alongside patch management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-03-25T09:12:14.110Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9822c4522896dcbde06d
Added to database: 5/21/2025, 9:08:50 AM
Last enriched: 6/28/2025, 4:56:19 AM
Last updated: 12/2/2025, 9:40:16 AM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10971: CWE-922 Insecure Storage of Sensitive Information in FERMAX ELECTRÓNICA S.A.U MeetMe
HighCVE-2025-13696: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in softdiscover Zigaform – Price Calculator & Cost Estimation Form Builder Lite
MediumCVE-2025-11726: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13685: CWE-352 Cross-Site Request Forgery (CSRF) in ays-pro Photo Gallery by Ays – Responsive Image Gallery
MediumCVE-2025-13140: CWE-352 Cross-Site Request Forgery (CSRF) in devsoftbaltic SurveyJS: Drag & Drop WordPress Form Builder to create, style and embed multiple forms of any complexity
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.