Skip to main content

CVE-2021-47354: Vulnerability in Linux Linux

Critical
VulnerabilityCVE-2021-47354cvecve-2021-47354
Published: Tue May 21 2024 (05/21/2024, 14:35:57 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/sched: Avoid data corruptions Wait for all dependencies of a job to complete before killing it to avoid data corruptions.

AI-Powered Analysis

AILast updated: 07/03/2025, 06:11:42 UTC

Technical Analysis

CVE-2021-47354 is a critical vulnerability in the Linux kernel specifically related to the Direct Rendering Manager (DRM) scheduler subsystem. The flaw arises from improper handling of job dependencies within the DRM scheduler, where the kernel fails to wait for all dependencies of a job to complete before killing it. This can lead to data corruption due to premature termination of jobs that still have unresolved dependencies. The vulnerability is categorized under CWE-787, which refers to out-of-bounds write or memory corruption issues. The CVSS v3.1 score of 9.1 (critical) reflects the high severity of this vulnerability, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and high availability impact (A:H). This means an unauthenticated attacker can remotely exploit this vulnerability without user interaction, potentially causing denial of service through data corruption and impacting system confidentiality by possibly exposing sensitive data. The vulnerability affects multiple versions of the Linux kernel, as indicated by the repeated commit hashes, and has been publicly disclosed as of May 21, 2024. Although no known exploits are currently reported in the wild, the critical nature and ease of exploitation make it a significant threat. The fix involves ensuring that the DRM scheduler waits for all job dependencies to complete before terminating any job, thereby preventing data corruption. This vulnerability is particularly relevant for systems relying on Linux kernels with DRM components, such as servers, desktops, and embedded devices using GPU acceleration or graphics processing.

Potential Impact

For European organizations, the impact of CVE-2021-47354 can be substantial, especially for those operating Linux-based infrastructure with graphical or GPU-accelerated workloads. The vulnerability can lead to data corruption and denial of service, potentially disrupting critical services and causing downtime. Confidentiality impact suggests that sensitive data processed or stored on affected systems could be exposed, raising compliance concerns under regulations such as GDPR. Industries relying on Linux servers for cloud services, telecommunications, finance, healthcare, and manufacturing could face operational disruptions and data breaches. The availability impact is high, meaning that exploitation could cause system crashes or instability, affecting business continuity. Given the widespread use of Linux in European data centers and enterprise environments, the vulnerability could affect a broad range of organizations, from small businesses to large enterprises and public sector entities. The lack of required privileges or user interaction for exploitation increases the risk of automated or remote attacks, making timely patching critical to prevent potential exploitation.

Mitigation Recommendations

European organizations should prioritize the following mitigation steps: 1) Immediately apply the official Linux kernel patches that address CVE-2021-47354 as soon as they are available from trusted sources or distributions. 2) For environments where immediate patching is not feasible, implement network-level controls to restrict access to services that could trigger the vulnerability, such as limiting exposure of systems with DRM components to untrusted networks. 3) Monitor system logs and kernel messages for unusual behavior or crashes related to DRM scheduler activities to detect potential exploitation attempts. 4) Employ kernel hardening techniques and security modules (e.g., SELinux, AppArmor) to limit the impact of any exploitation. 5) Conduct thorough testing of updated kernels in staging environments before deployment to ensure stability and compatibility. 6) Maintain an inventory of Linux systems with DRM components to ensure all affected assets are identified and remediated. 7) Educate system administrators and security teams about the vulnerability and the importance of timely patching and monitoring. These steps go beyond generic advice by focusing on DRM-specific risk areas and operational controls tailored to the vulnerability's characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-21T14:28:16.986Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9835c4522896dcbea561

Added to database: 5/21/2025, 9:09:09 AM

Last enriched: 7/3/2025, 6:11:42 AM

Last updated: 8/13/2025, 12:15:41 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats