Skip to main content

CVE-2021-47477: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47477cvecve-2021-47477
Published: Wed May 22 2024 (05/22/2024, 08:19:30 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: comedi: dt9812: fix DMA buffers on stack USB transfer buffers are typically mapped for DMA and must not be allocated on the stack or transfers will fail. Allocate proper transfer buffers in the various command helpers and return an error on short transfers instead of acting on random stack data. Note that this also fixes a stack info leak on systems where DMA is not used as 32 bytes are always sent to the device regardless of how short the command is.

AI-Powered Analysis

AILast updated: 06/30/2025, 13:29:07 UTC

Technical Analysis

CVE-2021-47477 is a medium severity vulnerability identified in the Linux kernel's comedi driver, specifically related to the dt9812 device. The issue arises from improper handling of USB transfer buffers, which were previously allocated on the stack rather than in proper DMA-capable memory regions. USB transfers require buffers to be mapped for Direct Memory Access (DMA), and stack allocation is inappropriate because it can cause transfer failures. The vulnerability manifests in two main ways: first, USB transfers may fail due to the incorrect buffer allocation; second, there is a potential information leak where stack data could be exposed on systems that do not use DMA, as 32 bytes are always sent to the device regardless of the actual command length. The fix involves allocating proper DMA buffers in the command helper functions and returning an error on short transfers instead of processing potentially random stack data. This correction eliminates both the transfer failure and the stack information leak. The vulnerability does not require any privileges or user interaction to exploit and can be triggered remotely over the network (AV:N/AC:L/PR:N/UI:N), but it only impacts availability (A:L) without affecting confidentiality or integrity. No known exploits are currently in the wild, and the vulnerability was published on May 22, 2024. The CVSS v3.1 base score is 5.3, indicating medium severity.

Potential Impact

For European organizations, the impact of CVE-2021-47477 primarily concerns system stability and availability. Systems running vulnerable versions of the Linux kernel with the comedi dt9812 driver enabled may experience USB transfer failures, potentially disrupting operations that rely on USB-connected data acquisition or control devices. The stack information leak, while limited in scope, could theoretically expose sensitive kernel stack data, which might aid attackers in crafting further attacks, though no direct confidentiality breach is reported. Industrial, scientific, and medical sectors using specialized hardware interfacing via the dt9812 device could be particularly affected, as device malfunctions or data acquisition errors could impact critical processes. However, since the vulnerability does not allow privilege escalation or code execution, the overall risk is moderate. Organizations with high availability requirements or those using Linux-based embedded systems with this driver should prioritize patching to avoid operational disruptions.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Identify and inventory Linux systems running kernels with the comedi dt9812 driver enabled, especially in industrial control, scientific research, or embedded environments. 2) Apply the latest Linux kernel updates that include the fix for CVE-2021-47477 as soon as possible to ensure proper DMA buffer allocation and eliminate the stack info leak. 3) For systems where immediate patching is not feasible, consider disabling or unloading the comedi dt9812 driver if it is not critical to operations to mitigate the risk. 4) Monitor USB device logs and kernel messages for transfer errors that could indicate exploitation attempts or impact from this vulnerability. 5) Incorporate this vulnerability into vulnerability management and patching cycles, ensuring that embedded and specialized Linux systems are not overlooked. 6) Engage with hardware vendors for any firmware or driver updates related to the dt9812 device to ensure end-to-end mitigation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-22T06:20:56.200Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9833c4522896dcbe924a

Added to database: 5/21/2025, 9:09:07 AM

Last enriched: 6/30/2025, 1:29:07 PM

Last updated: 8/17/2025, 10:52:27 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats