Skip to main content

CVE-2021-47348: Vulnerability in Linux Linux

Critical
VulnerabilityCVE-2021-47348cvecve-2021-47348
Published: Tue May 21 2024 (05/21/2024, 14:35:53 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Avoid HDCP over-read and corruption Instead of reading the desired 5 bytes of the actual target field, the code was reading 8. This could result in a corrupted value if the trailing 3 bytes were non-zero, so instead use an appropriately sized and zero-initialized bounce buffer, and read only 5 bytes before casting to u64.

AI-Powered Analysis

AILast updated: 07/03/2025, 06:11:30 UTC

Technical Analysis

CVE-2021-47348 is a critical vulnerability identified in the Linux kernel's Direct Rendering Manager (DRM) subsystem, specifically within the AMD display driver component. The flaw arises from improper handling of HDCP (High-bandwidth Digital Content Protection) data reads. The vulnerable code attempted to read 8 bytes from a target field when only 5 bytes were intended. This over-read could lead to corrupted values if the extra 3 bytes contained non-zero data. The root cause is a classic buffer over-read issue (CWE-119), where the code reads beyond the intended memory boundary. The fix involves using a zero-initialized bounce buffer of appropriate size and reading only the exact 5 bytes before casting the data to a 64-bit unsigned integer. This vulnerability can cause data corruption and potentially impact system stability or availability. According to the CVSS v3.1 score of 9.1 (critical), the vulnerability is remotely exploitable without authentication or user interaction, with a network attack vector, low complexity, and high impact on confidentiality and availability but no impact on integrity. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make it a significant threat to Linux systems using the affected AMD DRM driver versions. The vulnerability affects Linux kernel versions identified by the given commit hashes, indicating it is present in recent or specific kernel builds prior to the patch. This vulnerability is particularly relevant for systems running AMD GPUs under Linux, including servers, desktops, and embedded devices relying on the DRM subsystem for graphics rendering.

Potential Impact

For European organizations, the impact of CVE-2021-47348 can be substantial, especially those relying on Linux-based infrastructure with AMD graphics hardware. The vulnerability could lead to denial of service conditions due to system instability or crashes caused by corrupted HDCP data handling. Confidentiality impact is high, suggesting potential leakage or exposure of protected content streams, which could affect media companies, broadcasters, and organizations handling DRM-protected content. The availability impact is also high, potentially disrupting critical services or user operations. Given the widespread use of Linux in enterprise environments, cloud providers, and embedded systems across Europe, exploitation could affect a broad range of sectors including finance, telecommunications, media, and government. The lack of required privileges or user interaction means attackers could remotely exploit vulnerable systems, increasing the risk of large-scale attacks or targeted intrusions. Although no active exploits are known, the critical CVSS score and nature of the vulnerability necessitate urgent attention to prevent future exploitation attempts.

Mitigation Recommendations

European organizations should prioritize patching Linux kernels to versions that include the fix for CVE-2021-47348. Since the vulnerability resides in the AMD DRM driver, systems using AMD GPUs should be identified and updated promptly. Organizations should: 1) Audit their Linux systems to determine affected kernel versions and AMD GPU usage. 2) Apply vendor-provided kernel updates or backported patches that address the buffer over-read issue. 3) Where immediate patching is not feasible, consider disabling or restricting access to the AMD DRM driver or HDCP functionality to reduce exposure. 4) Implement network-level protections such as firewall rules and intrusion detection systems to monitor and block suspicious traffic targeting graphics subsystems. 5) Monitor security advisories and threat intelligence feeds for any emerging exploit attempts related to this vulnerability. 6) Conduct internal testing to verify the stability and security of patched systems before wide deployment. 7) For cloud or virtualized environments, coordinate with service providers to ensure underlying host kernels are patched. These steps go beyond generic advice by focusing on hardware-specific considerations and operational controls tailored to the vulnerability's characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-21T14:28:16.983Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9835c4522896dcbea52e

Added to database: 5/21/2025, 9:09:09 AM

Last enriched: 7/3/2025, 6:11:30 AM

Last updated: 8/11/2025, 11:32:35 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats