CVE-2021-47477: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: comedi: dt9812: fix DMA buffers on stack USB transfer buffers are typically mapped for DMA and must not be allocated on the stack or transfers will fail. Allocate proper transfer buffers in the various command helpers and return an error on short transfers instead of acting on random stack data. Note that this also fixes a stack info leak on systems where DMA is not used as 32 bytes are always sent to the device regardless of how short the command is.
AI Analysis
Technical Summary
CVE-2021-47477 is a medium severity vulnerability identified in the Linux kernel's comedi driver, specifically related to the dt9812 device. The issue arises from improper handling of USB transfer buffers, which were previously allocated on the stack rather than in proper DMA-capable memory regions. USB transfers require buffers to be mapped for Direct Memory Access (DMA), and stack allocation is inappropriate because it can cause transfer failures. The vulnerability manifests in two main ways: first, USB transfers may fail due to the incorrect buffer allocation; second, there is a potential information leak where stack data could be exposed on systems that do not use DMA, as 32 bytes are always sent to the device regardless of the actual command length. The fix involves allocating proper DMA buffers in the command helper functions and returning an error on short transfers instead of processing potentially random stack data. This correction eliminates both the transfer failure and the stack information leak. The vulnerability does not require any privileges or user interaction to exploit and can be triggered remotely over the network (AV:N/AC:L/PR:N/UI:N), but it only impacts availability (A:L) without affecting confidentiality or integrity. No known exploits are currently in the wild, and the vulnerability was published on May 22, 2024. The CVSS v3.1 base score is 5.3, indicating medium severity.
Potential Impact
For European organizations, the impact of CVE-2021-47477 primarily concerns system stability and availability. Systems running vulnerable versions of the Linux kernel with the comedi dt9812 driver enabled may experience USB transfer failures, potentially disrupting operations that rely on USB-connected data acquisition or control devices. The stack information leak, while limited in scope, could theoretically expose sensitive kernel stack data, which might aid attackers in crafting further attacks, though no direct confidentiality breach is reported. Industrial, scientific, and medical sectors using specialized hardware interfacing via the dt9812 device could be particularly affected, as device malfunctions or data acquisition errors could impact critical processes. However, since the vulnerability does not allow privilege escalation or code execution, the overall risk is moderate. Organizations with high availability requirements or those using Linux-based embedded systems with this driver should prioritize patching to avoid operational disruptions.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Identify and inventory Linux systems running kernels with the comedi dt9812 driver enabled, especially in industrial control, scientific research, or embedded environments. 2) Apply the latest Linux kernel updates that include the fix for CVE-2021-47477 as soon as possible to ensure proper DMA buffer allocation and eliminate the stack info leak. 3) For systems where immediate patching is not feasible, consider disabling or unloading the comedi dt9812 driver if it is not critical to operations to mitigate the risk. 4) Monitor USB device logs and kernel messages for transfer errors that could indicate exploitation attempts or impact from this vulnerability. 5) Incorporate this vulnerability into vulnerability management and patching cycles, ensuring that embedded and specialized Linux systems are not overlooked. 6) Engage with hardware vendors for any firmware or driver updates related to the dt9812 device to ensure end-to-end mitigation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Belgium, Poland
CVE-2021-47477: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: comedi: dt9812: fix DMA buffers on stack USB transfer buffers are typically mapped for DMA and must not be allocated on the stack or transfers will fail. Allocate proper transfer buffers in the various command helpers and return an error on short transfers instead of acting on random stack data. Note that this also fixes a stack info leak on systems where DMA is not used as 32 bytes are always sent to the device regardless of how short the command is.
AI-Powered Analysis
Technical Analysis
CVE-2021-47477 is a medium severity vulnerability identified in the Linux kernel's comedi driver, specifically related to the dt9812 device. The issue arises from improper handling of USB transfer buffers, which were previously allocated on the stack rather than in proper DMA-capable memory regions. USB transfers require buffers to be mapped for Direct Memory Access (DMA), and stack allocation is inappropriate because it can cause transfer failures. The vulnerability manifests in two main ways: first, USB transfers may fail due to the incorrect buffer allocation; second, there is a potential information leak where stack data could be exposed on systems that do not use DMA, as 32 bytes are always sent to the device regardless of the actual command length. The fix involves allocating proper DMA buffers in the command helper functions and returning an error on short transfers instead of processing potentially random stack data. This correction eliminates both the transfer failure and the stack information leak. The vulnerability does not require any privileges or user interaction to exploit and can be triggered remotely over the network (AV:N/AC:L/PR:N/UI:N), but it only impacts availability (A:L) without affecting confidentiality or integrity. No known exploits are currently in the wild, and the vulnerability was published on May 22, 2024. The CVSS v3.1 base score is 5.3, indicating medium severity.
Potential Impact
For European organizations, the impact of CVE-2021-47477 primarily concerns system stability and availability. Systems running vulnerable versions of the Linux kernel with the comedi dt9812 driver enabled may experience USB transfer failures, potentially disrupting operations that rely on USB-connected data acquisition or control devices. The stack information leak, while limited in scope, could theoretically expose sensitive kernel stack data, which might aid attackers in crafting further attacks, though no direct confidentiality breach is reported. Industrial, scientific, and medical sectors using specialized hardware interfacing via the dt9812 device could be particularly affected, as device malfunctions or data acquisition errors could impact critical processes. However, since the vulnerability does not allow privilege escalation or code execution, the overall risk is moderate. Organizations with high availability requirements or those using Linux-based embedded systems with this driver should prioritize patching to avoid operational disruptions.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Identify and inventory Linux systems running kernels with the comedi dt9812 driver enabled, especially in industrial control, scientific research, or embedded environments. 2) Apply the latest Linux kernel updates that include the fix for CVE-2021-47477 as soon as possible to ensure proper DMA buffer allocation and eliminate the stack info leak. 3) For systems where immediate patching is not feasible, consider disabling or unloading the comedi dt9812 driver if it is not critical to operations to mitigate the risk. 4) Monitor USB device logs and kernel messages for transfer errors that could indicate exploitation attempts or impact from this vulnerability. 5) Incorporate this vulnerability into vulnerability management and patching cycles, ensuring that embedded and specialized Linux systems are not overlooked. 6) Engage with hardware vendors for any firmware or driver updates related to the dt9812 device to ensure end-to-end mitigation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-22T06:20:56.200Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9833c4522896dcbe924a
Added to database: 5/21/2025, 9:09:07 AM
Last enriched: 6/30/2025, 1:29:07 PM
Last updated: 8/17/2025, 10:52:27 AM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.