CVE-2021-47331: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: usb: common: usb-conn-gpio: fix NULL pointer dereference of charger When power on system with OTG cable, IDDIG's interrupt arises before the charger registration, it will cause a NULL pointer dereference, fix the issue by registering the power supply before requesting IDDIG/VBUS irq.
AI Analysis
Technical Summary
CVE-2021-47331 is a vulnerability identified in the Linux kernel's USB subsystem, specifically within the usb-conn-gpio driver component. The flaw arises due to a NULL pointer dereference condition triggered when the system powers on with an OTG (On-The-Go) cable connected. The root cause is that the IDDIG (ID Detection Interrupt GPIO) interrupt can occur before the charger device is registered by the kernel. This sequence leads to the driver attempting to access a NULL pointer, causing a kernel crash or system instability. The vulnerability is addressed by modifying the initialization sequence to ensure that the power supply is registered before the IDDIG and VBUS interrupts are requested, preventing the NULL pointer dereference. This bug is a classic example of improper ordering in device initialization within kernel drivers, which can lead to denial of service (DoS) conditions due to kernel panics. The affected Linux kernel versions are identified by specific commit hashes, indicating that this issue is present in certain recent or development versions of the kernel. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability is technical and low-level, impacting systems that use the usb-conn-gpio driver and support OTG functionality, which is common in embedded and mobile Linux environments.
Potential Impact
For European organizations, the primary impact of CVE-2021-47331 is the potential for denial of service on Linux-based devices that utilize the affected USB driver with OTG capabilities. This can lead to system crashes or reboots, disrupting operations especially in embedded systems, IoT devices, or specialized hardware running Linux kernels with this driver. Critical infrastructure sectors such as manufacturing, telecommunications, and transportation that rely on embedded Linux systems could experience operational interruptions. While the vulnerability does not appear to allow privilege escalation or remote code execution, the resulting instability could be exploited in targeted attacks to cause service outages or to facilitate further attacks by causing system resets. The lack of known exploits reduces immediate risk, but organizations should be aware that attackers could develop exploits once the vulnerability details are public. The impact on confidentiality and integrity is minimal, but availability is affected due to potential kernel panics. European organizations using Linux in embedded or mobile contexts should prioritize patching to maintain system reliability.
Mitigation Recommendations
To mitigate CVE-2021-47331, organizations should: 1) Identify all Linux systems using kernels that include the usb-conn-gpio driver, particularly those with OTG support. 2) Apply the official kernel patches or updates that reorder the initialization sequence to register the power supply before requesting IDDIG/VBUS interrupts. 3) For embedded or custom Linux distributions, rebuild the kernel with the patched driver version. 4) Implement monitoring to detect kernel panics or unexpected reboots related to USB device events. 5) Limit physical access to devices where possible to reduce the risk of attackers connecting malicious OTG cables. 6) Engage with hardware and software vendors to ensure timely updates and support for affected devices. 7) Test patches in controlled environments before deployment to avoid regressions. These steps go beyond generic advice by focusing on the specific driver and initialization sequence involved in the vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2021-47331: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: usb: common: usb-conn-gpio: fix NULL pointer dereference of charger When power on system with OTG cable, IDDIG's interrupt arises before the charger registration, it will cause a NULL pointer dereference, fix the issue by registering the power supply before requesting IDDIG/VBUS irq.
AI-Powered Analysis
Technical Analysis
CVE-2021-47331 is a vulnerability identified in the Linux kernel's USB subsystem, specifically within the usb-conn-gpio driver component. The flaw arises due to a NULL pointer dereference condition triggered when the system powers on with an OTG (On-The-Go) cable connected. The root cause is that the IDDIG (ID Detection Interrupt GPIO) interrupt can occur before the charger device is registered by the kernel. This sequence leads to the driver attempting to access a NULL pointer, causing a kernel crash or system instability. The vulnerability is addressed by modifying the initialization sequence to ensure that the power supply is registered before the IDDIG and VBUS interrupts are requested, preventing the NULL pointer dereference. This bug is a classic example of improper ordering in device initialization within kernel drivers, which can lead to denial of service (DoS) conditions due to kernel panics. The affected Linux kernel versions are identified by specific commit hashes, indicating that this issue is present in certain recent or development versions of the kernel. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability is technical and low-level, impacting systems that use the usb-conn-gpio driver and support OTG functionality, which is common in embedded and mobile Linux environments.
Potential Impact
For European organizations, the primary impact of CVE-2021-47331 is the potential for denial of service on Linux-based devices that utilize the affected USB driver with OTG capabilities. This can lead to system crashes or reboots, disrupting operations especially in embedded systems, IoT devices, or specialized hardware running Linux kernels with this driver. Critical infrastructure sectors such as manufacturing, telecommunications, and transportation that rely on embedded Linux systems could experience operational interruptions. While the vulnerability does not appear to allow privilege escalation or remote code execution, the resulting instability could be exploited in targeted attacks to cause service outages or to facilitate further attacks by causing system resets. The lack of known exploits reduces immediate risk, but organizations should be aware that attackers could develop exploits once the vulnerability details are public. The impact on confidentiality and integrity is minimal, but availability is affected due to potential kernel panics. European organizations using Linux in embedded or mobile contexts should prioritize patching to maintain system reliability.
Mitigation Recommendations
To mitigate CVE-2021-47331, organizations should: 1) Identify all Linux systems using kernels that include the usb-conn-gpio driver, particularly those with OTG support. 2) Apply the official kernel patches or updates that reorder the initialization sequence to register the power supply before requesting IDDIG/VBUS interrupts. 3) For embedded or custom Linux distributions, rebuild the kernel with the patched driver version. 4) Implement monitoring to detect kernel panics or unexpected reboots related to USB device events. 5) Limit physical access to devices where possible to reduce the risk of attackers connecting malicious OTG cables. 6) Engage with hardware and software vendors to ensure timely updates and support for affected devices. 7) Test patches in controlled environments before deployment to avoid regressions. These steps go beyond generic advice by focusing on the specific driver and initialization sequence involved in the vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-21T14:28:16.975Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9835c4522896dcbea47e
Added to database: 5/21/2025, 9:09:09 AM
Last enriched: 6/26/2025, 10:51:11 AM
Last updated: 8/11/2025, 2:44:56 AM
Views: 13
Related Threats
CVE-2025-8927: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumCVE-2025-43988: n/a
CriticalCVE-2025-8926: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-43986: n/a
CriticalCVE-2025-43982: n/a
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.