Skip to main content

CVE-2021-47471: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47471cvecve-2021-47471
Published: Wed May 22 2024 (05/22/2024, 06:23:28 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm: mxsfb: Fix NULL pointer dereference crash on unload The mxsfb->crtc.funcs may already be NULL when unloading the driver, in which case calling mxsfb_irq_disable() via drm_irq_uninstall() from mxsfb_unload() leads to NULL pointer dereference. Since all we care about is masking the IRQ and mxsfb->base is still valid, just use that to clear and mask the IRQ.

AI-Powered Analysis

AILast updated: 06/30/2025, 13:27:40 UTC

Technical Analysis

CVE-2021-47471 is a medium-severity vulnerability identified in the Linux kernel's Direct Rendering Manager (DRM) subsystem, specifically within the mxsfb framebuffer driver. The issue arises due to a NULL pointer dereference during the driver unload process. The vulnerability occurs because the mxsfb->crtc.funcs pointer may already be NULL when the driver is being unloaded. Despite this, the function mxsfb_irq_disable() is called via drm_irq_uninstall() from mxsfb_unload(), which attempts to dereference this NULL pointer, leading to a crash. The root cause is improper handling of the driver’s internal state during unload, where the code assumes the presence of valid function pointers without verifying them. The fix involves modifying the IRQ masking logic to rely on the still-valid mxsfb->base pointer instead of the potentially NULL mxsfb->crtc.funcs, thereby preventing the NULL pointer dereference. This vulnerability is classified under CWE-476 (NULL Pointer Dereference) and has a CVSS v3.1 base score of 5.5, indicating a medium severity level. The attack vector is local (AV:L), requiring low privileges (PR:L) but no user interaction (UI:N). The impact is limited to availability (A:H) with no confidentiality or integrity impact. There are no known exploits in the wild at this time, and the vulnerability primarily results in a denial of service (system crash) when the affected driver is unloaded improperly.

Potential Impact

For European organizations, the impact of CVE-2021-47471 is primarily related to system availability. Since the vulnerability causes a NULL pointer dereference leading to a kernel crash during driver unload, it can result in denial of service conditions on affected Linux systems. Organizations running Linux distributions with the vulnerable mxsfb framebuffer driver, particularly in embedded or specialized hardware environments where this driver is used, may experience unexpected system reboots or crashes. This can disrupt critical services, especially in industrial, telecommunications, or infrastructure sectors that rely on stable Linux-based systems. However, the attack vector is local, requiring an attacker to have low-level access to the system, which limits remote exploitation risks. The absence of confidentiality or integrity impacts reduces the risk of data breaches or unauthorized data manipulation. Nonetheless, availability disruptions can affect operational continuity and service reliability, which are critical for many European enterprises and public sector organizations.

Mitigation Recommendations

To mitigate CVE-2021-47471, European organizations should: 1) Apply the latest Linux kernel patches from trusted sources or vendor-provided updates that address this specific NULL pointer dereference in the mxsfb driver. 2) For systems where immediate patching is not feasible, consider disabling or unloading the mxsfb framebuffer driver if it is not essential to system operation, thereby eliminating the attack surface. 3) Implement strict access controls to limit local user privileges, preventing unauthorized users from unloading kernel drivers or triggering the vulnerability. 4) Monitor system logs and kernel messages for signs of crashes or driver unload events that could indicate exploitation attempts or instability. 5) Employ kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and secure boot to reduce the risk of local privilege escalation that could facilitate exploitation. 6) In environments using embedded Linux systems with this driver, coordinate with hardware vendors to ensure firmware and kernel updates are applied promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-22T06:20:56.199Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9833c4522896dcbe9220

Added to database: 5/21/2025, 9:09:07 AM

Last enriched: 6/30/2025, 1:27:40 PM

Last updated: 8/12/2025, 6:28:54 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats