Skip to main content

CVE-2021-47273: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47273cvecve-2021-47273
Published: Tue May 21 2024 (05/21/2024, 14:20:02 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: usb: dwc3-meson-g12a: fix usb2 PHY glue init when phy0 is disabled When only PHY1 is used (for example on Odroid-HC4), the regmap init code uses the usb2 ports when doesn't initialize the PHY1 regmap entry. This fixes: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000020 ... pc : regmap_update_bits_base+0x40/0xa0 lr : dwc3_meson_g12a_usb2_init_phy+0x4c/0xf8 ... Call trace: regmap_update_bits_base+0x40/0xa0 dwc3_meson_g12a_usb2_init_phy+0x4c/0xf8 dwc3_meson_g12a_usb2_init+0x7c/0xc8 dwc3_meson_g12a_usb_init+0x28/0x48 dwc3_meson_g12a_probe+0x298/0x540 platform_probe+0x70/0xe0 really_probe+0xf0/0x4d8 driver_probe_device+0xfc/0x168 ...

AI-Powered Analysis

AILast updated: 06/26/2025, 12:20:46 UTC

Technical Analysis

CVE-2021-47273 is a vulnerability identified in the Linux kernel specifically affecting the USB controller driver for the dwc3-meson-g12a platform, which is used in certain ARM-based devices such as the Odroid-HC4. The issue arises when only the second USB PHY (PHY1) is used and the first PHY (PHY0) is disabled. In this scenario, the regmap initialization code incorrectly attempts to use USB2 ports without properly initializing the PHY1 regmap entry. This leads to a NULL pointer dereference at a low virtual memory address (0x20), causing a kernel crash (kernel panic) due to an unhandled NULL pointer dereference. The call trace shows the failure occurs during the USB PHY initialization sequence, specifically in the dwc3_meson_g12a_usb2_init_phy function. This vulnerability is a denial-of-service (DoS) type issue that can cause the affected system to crash and become unresponsive. It is triggered by the kernel code path during device initialization and does not require user interaction or authentication, but it is limited to systems using this specific USB controller driver and configuration. No known exploits are reported in the wild at this time. The vulnerability has been addressed by fixing the USB2 PHY glue initialization logic to correctly handle the case when PHY0 is disabled and PHY1 is used, preventing the NULL pointer dereference.

Potential Impact

For European organizations, the impact of CVE-2021-47273 is primarily related to system availability and stability. Devices running Linux kernels with the affected dwc3-meson-g12a USB controller driver, especially ARM-based embedded systems like Odroid-HC4 or similar hardware, could experience unexpected kernel panics leading to downtime. This can disrupt critical services or operations relying on such devices, particularly in industrial, IoT, or edge computing environments where these platforms are deployed. While the vulnerability does not directly expose confidentiality or integrity risks, the denial-of-service effect could impact operational continuity. Organizations using affected hardware in production or operational technology (OT) environments should be aware of potential service interruptions. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or targeted triggering of the bug, which could be leveraged in multi-stage attacks or cause cascading failures in complex deployments.

Mitigation Recommendations

To mitigate CVE-2021-47273, organizations should: 1) Identify all devices running Linux kernels with the dwc3-meson-g12a USB controller driver, particularly those using ARM-based platforms like Odroid-HC4. 2) Apply the official Linux kernel patches that fix the USB2 PHY glue initialization logic as soon as they become available from trusted Linux kernel sources or device vendors. 3) If patching is not immediately possible, consider disabling or avoiding configurations that use only PHY1 with PHY0 disabled to prevent triggering the faulty initialization path. 4) Implement monitoring for kernel panics or unexpected reboots on affected devices to detect potential exploitation or accidental triggering. 5) For embedded or IoT devices, ensure firmware updates include the patched kernel version and validate update mechanisms to deploy fixes efficiently. 6) Engage with hardware vendors to confirm the availability of updated firmware or kernel versions addressing this vulnerability. These steps go beyond generic advice by focusing on hardware-specific configurations and emphasizing proactive identification and patch management in embedded Linux environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-21T13:27:52.127Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9835c4522896dcbea288

Added to database: 5/21/2025, 9:09:09 AM

Last enriched: 6/26/2025, 12:20:46 PM

Last updated: 7/28/2025, 3:44:13 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats