CVE-2021-47386: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field If driver read val value sufficient for (val & 0x08) && (!(val & 0x80)) && ((val & 0x7) == ((val >> 4) & 0x7)) from device then Null pointer dereference occurs. (It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers) Also lm75[] does not serve a purpose anymore after switching to devm_i2c_new_dummy_device() in w83791d_detect_subclients(). The patch fixes possible NULL pointer dereference by removing lm75[]. Found by Linux Driver Verification project (linuxtesting.org). [groeck: Dropped unnecessary continuation lines, fixed multi-line alignment]
AI Analysis
Technical Summary
CVE-2021-47386 is a high-severity vulnerability identified in the Linux kernel's hardware monitoring (hwmon) driver for the w83791d chip. The vulnerability arises from a NULL pointer dereference caused by an unnecessary structure field (lm75[]) that was retained after a transition to a new device instantiation method (devm_i2c_new_dummy_device()) in the w83791d_detect_subclients() function. Specifically, if the driver reads a value from the device that satisfies the condition (val & 0x08) && (!(val & 0x80)) && ((val & 0x7) == ((val >> 4) & 0x7)), a NULL pointer dereference can occur. This condition corresponds to certain bit patterns in the device's returned value, which can lead to the driver dereferencing a NULL pointer, causing a kernel crash or system instability. The vulnerability was discovered by the Linux Driver Verification project and has been addressed by removing the obsolete lm75[] structure field, thereby preventing the NULL pointer dereference. The CVSS v3.1 score of 7.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, requiring low privileges and no user interaction, but local access to the system. This vulnerability affects specific Linux kernel versions identified by their commit hashes. No known exploits are currently reported in the wild.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to systems running affected Linux kernel versions with the w83791d hardware monitoring driver enabled. The NULL pointer dereference can lead to kernel panics, causing denial of service (DoS) conditions that disrupt critical services and operations. In environments such as data centers, industrial control systems, and embedded devices relying on Linux for hardware monitoring, this could result in system outages and operational downtime. Additionally, the high impact on confidentiality and integrity suggests potential for more severe exploitation if combined with other vulnerabilities, possibly allowing attackers to escalate privileges or execute arbitrary code. Given the widespread use of Linux in European enterprises, government agencies, and infrastructure, the vulnerability could affect a broad range of sectors including finance, manufacturing, telecommunications, and public services. The local access requirement limits remote exploitation but insider threats or compromised local accounts could leverage this flaw to destabilize systems.
Mitigation Recommendations
European organizations should prioritize patching affected Linux kernel versions by applying the official fixes that remove the unnecessary lm75[] structure field and correct the driver logic in w83791d_detect_subclients(). System administrators must audit their Linux deployments to identify systems using the vulnerable w83791d driver, especially in critical infrastructure and embedded devices. Disabling the hwmon driver for w83791d where hardware monitoring is not essential can serve as a temporary mitigation. Implement strict access controls and monitoring to limit local user privileges and detect anomalous behavior indicative of exploitation attempts. Incorporate kernel crash monitoring and automated recovery mechanisms to minimize downtime. For organizations using custom or older Linux kernels, backporting the patch or upgrading to a supported kernel version is essential. Additionally, integrating this vulnerability into vulnerability management and incident response workflows will ensure timely detection and remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2021-47386: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field If driver read val value sufficient for (val & 0x08) && (!(val & 0x80)) && ((val & 0x7) == ((val >> 4) & 0x7)) from device then Null pointer dereference occurs. (It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers) Also lm75[] does not serve a purpose anymore after switching to devm_i2c_new_dummy_device() in w83791d_detect_subclients(). The patch fixes possible NULL pointer dereference by removing lm75[]. Found by Linux Driver Verification project (linuxtesting.org). [groeck: Dropped unnecessary continuation lines, fixed multi-line alignment]
AI-Powered Analysis
Technical Analysis
CVE-2021-47386 is a high-severity vulnerability identified in the Linux kernel's hardware monitoring (hwmon) driver for the w83791d chip. The vulnerability arises from a NULL pointer dereference caused by an unnecessary structure field (lm75[]) that was retained after a transition to a new device instantiation method (devm_i2c_new_dummy_device()) in the w83791d_detect_subclients() function. Specifically, if the driver reads a value from the device that satisfies the condition (val & 0x08) && (!(val & 0x80)) && ((val & 0x7) == ((val >> 4) & 0x7)), a NULL pointer dereference can occur. This condition corresponds to certain bit patterns in the device's returned value, which can lead to the driver dereferencing a NULL pointer, causing a kernel crash or system instability. The vulnerability was discovered by the Linux Driver Verification project and has been addressed by removing the obsolete lm75[] structure field, thereby preventing the NULL pointer dereference. The CVSS v3.1 score of 7.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, requiring low privileges and no user interaction, but local access to the system. This vulnerability affects specific Linux kernel versions identified by their commit hashes. No known exploits are currently reported in the wild.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to systems running affected Linux kernel versions with the w83791d hardware monitoring driver enabled. The NULL pointer dereference can lead to kernel panics, causing denial of service (DoS) conditions that disrupt critical services and operations. In environments such as data centers, industrial control systems, and embedded devices relying on Linux for hardware monitoring, this could result in system outages and operational downtime. Additionally, the high impact on confidentiality and integrity suggests potential for more severe exploitation if combined with other vulnerabilities, possibly allowing attackers to escalate privileges or execute arbitrary code. Given the widespread use of Linux in European enterprises, government agencies, and infrastructure, the vulnerability could affect a broad range of sectors including finance, manufacturing, telecommunications, and public services. The local access requirement limits remote exploitation but insider threats or compromised local accounts could leverage this flaw to destabilize systems.
Mitigation Recommendations
European organizations should prioritize patching affected Linux kernel versions by applying the official fixes that remove the unnecessary lm75[] structure field and correct the driver logic in w83791d_detect_subclients(). System administrators must audit their Linux deployments to identify systems using the vulnerable w83791d driver, especially in critical infrastructure and embedded devices. Disabling the hwmon driver for w83791d where hardware monitoring is not essential can serve as a temporary mitigation. Implement strict access controls and monitoring to limit local user privileges and detect anomalous behavior indicative of exploitation attempts. Incorporate kernel crash monitoring and automated recovery mechanisms to minimize downtime. For organizations using custom or older Linux kernels, backporting the patch or upgrading to a supported kernel version is essential. Additionally, integrating this vulnerability into vulnerability management and incident response workflows will ensure timely detection and remediation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-21T14:58:30.813Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9833c4522896dcbe8fa0
Added to database: 5/21/2025, 9:09:07 AM
Last enriched: 7/3/2025, 5:11:30 AM
Last updated: 8/9/2025, 4:54:42 AM
Views: 12
Related Threats
CVE-2025-8293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Theerawat Patthawee Intl DateTime Calendar
MediumCVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)
MediumCVE-2025-7684: CWE-352 Cross-Site Request Forgery (CSRF) in remysharp Last.fm Recent Album Artwork
MediumCVE-2025-7683: CWE-352 Cross-Site Request Forgery (CSRF) in janyksteenbeek LatestCheckins
MediumCVE-2025-7668: CWE-352 Cross-Site Request Forgery (CSRF) in timothyja Linux Promotional Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.