Skip to main content

CVE-2021-47533: Vulnerability in Linux Linux

High
VulnerabilityCVE-2021-47533cvecve-2021-47533
Published: Fri May 24 2024 (05/24/2024, 15:09:42 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/vc4: kms: Clear the HVS FIFO commit pointer once done Commit 9ec03d7f1ed3 ("drm/vc4: kms: Wait on previous FIFO users before a commit") introduced a wait on the previous commit done on a given HVS FIFO. However, we never cleared that pointer once done. Since drm_crtc_commit_put can free the drm_crtc_commit structure directly if we were the last user, this means that it can lead to a use-after free if we were to duplicate the state, and that stale pointer would even be copied to the new state. Set the pointer to NULL once we're done with the wait so that we don't carry over a pointer to a free'd structure.

AI-Powered Analysis

AILast updated: 06/30/2025, 14:25:36 UTC

Technical Analysis

CVE-2021-47533 is a use-after-free vulnerability found in the Linux kernel's Direct Rendering Manager (DRM) subsystem, specifically within the vc4 driver that handles the VideoCore IV GPU used in some Broadcom SoCs. The issue arises from improper management of the HVS (Hardware Video Scaler) FIFO commit pointer. A recent commit introduced a synchronization mechanism that waits for the completion of a previous FIFO commit before proceeding. However, the pointer to the previous commit was not cleared after the wait completed. Because drm_crtc_commit_put can free the drm_crtc_commit structure if it is the last user, retaining a stale pointer leads to a use-after-free condition when the state is duplicated and the stale pointer is copied to the new state. This can cause memory corruption, potentially leading to kernel crashes or arbitrary code execution in kernel context if exploited. The vulnerability affects Linux kernel versions containing the faulty commit 9ec03d7f1ed3. No public exploits are known at this time, and no CVSS score has been assigned. The fix involves setting the pointer to NULL after the wait completes to prevent carrying over a pointer to a freed structure.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected vc4 DRM driver, which is common in embedded devices, IoT, and some ARM-based platforms using Broadcom hardware (e.g., Raspberry Pi devices). Exploitation could lead to privilege escalation or denial of service via kernel crashes, impacting availability and integrity of critical systems. Organizations relying on Linux-based infrastructure for industrial control, telecommunications, or edge computing could be affected if they use vulnerable kernel versions. Although no exploits are currently known, the use-after-free nature of the bug means that a successful exploit could allow attackers to execute arbitrary code with kernel privileges, severely compromising confidentiality, integrity, and availability. The impact is more significant in environments where untrusted users or processes have access to the system, as local exploitation is likely required. The vulnerability does not appear to require user interaction but does require the ability to trigger the specific DRM driver code paths.

Mitigation Recommendations

European organizations should promptly identify Linux systems running affected kernel versions with the vc4 DRM driver enabled, especially embedded and ARM-based devices. Applying the upstream Linux kernel patch that clears the HVS FIFO commit pointer after waiting is the definitive fix. If immediate patching is not feasible, organizations should restrict access to vulnerable systems, limit untrusted user privileges, and monitor for unusual kernel crashes or suspicious activity related to the DRM subsystem. For embedded devices, coordinate with hardware vendors or distributors to obtain updated firmware or kernel images. Additionally, implement kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR), and enable kernel lockdown features where applicable to reduce exploitation risk. Regularly audit and update Linux kernels to the latest stable releases to minimize exposure to such vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-24T15:02:54.826Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9833c4522896dcbe93b7

Added to database: 5/21/2025, 9:09:07 AM

Last enriched: 6/30/2025, 2:25:36 PM

Last updated: 8/11/2025, 4:26:38 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats