Skip to main content

CVE-2021-47526: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47526cvecve-2021-47526
Published: Fri May 24 2024 (05/24/2024, 15:09:38 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: serial: liteuart: Fix NULL pointer dereference in ->remove() drvdata has to be set in _probe() - otherwise platform_get_drvdata() causes null pointer dereference BUG in _remove().

AI-Powered Analysis

AILast updated: 06/30/2025, 14:13:32 UTC

Technical Analysis

CVE-2021-47526 is a vulnerability identified in the Linux kernel's serial liteuart driver. The issue arises due to improper handling of the driver data pointer (drvdata) during the device removal process. Specifically, if drvdata is not set during the probe phase (_probe()), the subsequent call to platform_get_drvdata() in the remove function (_remove()) results in a NULL pointer dereference. This causes a kernel BUG, leading to a system crash or kernel panic. The vulnerability is rooted in a logic error where the driver fails to initialize the necessary data structures before device removal, causing the kernel to dereference a NULL pointer. Although this is a denial-of-service (DoS) type vulnerability rather than a remote code execution flaw, it can cause system instability or downtime. The vulnerability affects Linux kernel versions identified by the commit hash 1da81e5562fac8286567422cc56a7fbd0dc646d4, and it has been publicly disclosed as of May 24, 2024. There are no known exploits in the wild at this time, and no CVSS score has been assigned. The fix involves ensuring drvdata is properly set in the probe function to prevent the NULL pointer dereference during removal.

Potential Impact

For European organizations, the primary impact of CVE-2021-47526 is the potential for denial-of-service conditions on Linux systems using the affected liteuart serial driver. This could lead to unexpected system crashes or kernel panics, resulting in service interruptions, especially in environments where Linux is used for critical infrastructure or embedded systems relying on serial communication. While the vulnerability does not allow for privilege escalation or data compromise directly, the resulting downtime could disrupt operations, cause loss of availability, and impact business continuity. Organizations running Linux kernels with this vulnerable driver, particularly in industrial control systems, telecommunications, or embedded device contexts, may experience operational instability. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or malicious triggering of the bug.

Mitigation Recommendations

To mitigate CVE-2021-47526, organizations should: 1) Apply the official Linux kernel patches that ensure drvdata is properly initialized in the liteuart driver's probe function. 2) Update Linux kernel versions to the latest stable releases that include this fix. 3) Audit systems to identify usage of the liteuart serial driver, especially in embedded or specialized hardware environments. 4) Implement monitoring for kernel panics or crashes related to serial device removal events to detect potential exploitation attempts or accidental triggers. 5) For critical systems, consider isolating or limiting access to devices using the liteuart driver until patched. 6) Incorporate this vulnerability into vulnerability management and patching schedules to ensure timely remediation. 7) Test patches in staging environments to verify stability before deployment in production.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-24T15:02:54.825Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9833c4522896dcbe9399

Added to database: 5/21/2025, 9:09:07 AM

Last enriched: 6/30/2025, 2:13:32 PM

Last updated: 8/15/2025, 9:48:47 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats