Skip to main content

CVE-2021-47380: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47380cvecve-2021-47380
Published: Tue May 21 2024 (05/21/2024, 15:03:42 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: HID: amd_sfh: Fix potential NULL pointer dereference devm_add_action_or_reset() can suddenly invoke amd_mp2_pci_remove() at registration that will cause NULL pointer dereference since corresponding data is not initialized yet. The patch moves initialization of data before devm_add_action_or_reset(). Found by Linux Driver Verification project (linuxtesting.org). [jkosina@suse.cz: rebase]

AI-Powered Analysis

AILast updated: 06/30/2025, 12:12:02 UTC

Technical Analysis

CVE-2021-47380 is a vulnerability identified in the Linux kernel, specifically within the Human Interface Device (HID) subsystem related to the amd_sfh driver. The issue arises from a potential NULL pointer dereference caused by the function devm_add_action_or_reset() invoking amd_mp2_pci_remove() prematurely during device registration. This invocation occurs before the necessary data structures are properly initialized, leading to a NULL pointer dereference condition. The root cause is that the initialization of critical data happens after the call to devm_add_action_or_reset(), which can trigger the removal function unexpectedly. The vulnerability was discovered by the Linux Driver Verification project (linuxtesting.org) and subsequently patched by reordering the initialization sequence to ensure data is set up before devm_add_action_or_reset() is called. This flaw could cause the kernel to crash or behave unpredictably due to dereferencing a NULL pointer, which is a common cause of system instability or denial of service. No known exploits are reported in the wild, and the vulnerability affects specific Linux kernel versions identified by commit hashes. The absence of a CVSS score indicates that the vulnerability has not been formally scored, but the technical details suggest it is a stability and availability concern rather than a direct confidentiality or integrity compromise.

Potential Impact

For European organizations, the primary impact of CVE-2021-47380 lies in potential system instability and denial of service on Linux systems running affected kernel versions with the amd_sfh driver active. This could disrupt critical services, especially in environments relying on Linux for servers, embedded systems, or specialized hardware using the affected HID driver. While this vulnerability does not appear to allow privilege escalation or data leakage, the resulting kernel crashes could lead to downtime, loss of availability, and operational disruption. Organizations with infrastructure that includes AMD hardware components interfacing through the affected driver are at higher risk. The impact is particularly relevant for sectors with high availability requirements such as finance, healthcare, manufacturing, and public services. Given that Linux is widely used across Europe in enterprise and government environments, unpatched systems could face increased risk of service interruptions. However, the lack of known exploits and the requirement for specific hardware and kernel versions somewhat limits the immediate threat level.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Identify Linux systems running kernel versions that include the affected amd_sfh driver and verify if they correspond to the vulnerable commit hashes. 2) Apply the official Linux kernel patches that reorder the initialization sequence to prevent the NULL pointer dereference. This may involve updating to the latest stable kernel releases provided by their Linux distribution vendors (e.g., SUSE, Debian, Ubuntu). 3) For embedded or specialized systems where kernel updates are less frequent, consider vendor-specific patches or workarounds. 4) Implement robust monitoring to detect kernel crashes or unusual system reboots that could indicate exploitation attempts or instability. 5) Maintain strict change management and testing procedures to ensure kernel updates do not disrupt production environments. 6) Engage with hardware vendors to confirm compatibility and support for patched kernel versions. 7) Limit exposure by restricting access to vulnerable systems and minimizing unnecessary device registrations that could trigger the flaw. These targeted steps go beyond generic advice by focusing on affected drivers, kernel versions, and operational controls specific to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-21T14:58:30.812Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9833c4522896dcbe8f67

Added to database: 5/21/2025, 9:09:07 AM

Last enriched: 6/30/2025, 12:12:02 PM

Last updated: 8/11/2025, 2:39:34 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats