CVE-2021-47631: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ARM: davinci: da850-evm: Avoid NULL pointer dereference With newer versions of GCC, there is a panic in da850_evm_config_emac() when booting multi_v5_defconfig in QEMU under the palmetto-bmc machine: Unable to handle kernel NULL pointer dereference at virtual address 00000020 pgd = (ptrval) [00000020] *pgd=00000000 Internal error: Oops: 5 [#1] PREEMPT ARM Modules linked in: CPU: 0 PID: 1 Comm: swapper Not tainted 5.15.0 #1 Hardware name: Generic DT based system PC is at da850_evm_config_emac+0x1c/0x120 LR is at do_one_initcall+0x50/0x1e0 The emac_pdata pointer in soc_info is NULL because davinci_soc_info only gets populated on davinci machines but da850_evm_config_emac() is called on all machines via device_initcall(). Move the rmii_en assignment below the machine check so that it is only dereferenced when running on a supported SoC.
AI Analysis
Technical Summary
CVE-2021-47631 is a vulnerability identified in the Linux kernel specifically affecting ARM architecture platforms using the davinci SoC family, notably the da850-evm board. The issue arises from a NULL pointer dereference in the da850_evm_config_emac() function during the initialization phase of the Ethernet MAC (emac) driver. The root cause is that the emac_pdata pointer within the soc_info structure is NULL because davinci_soc_info is only populated for davinci machines, but the da850_evm_config_emac() function is invoked on all machines via device_initcall(). This leads to an attempt to dereference a NULL pointer when assigning the rmii_en field, causing a kernel panic and system crash. The problem is triggered during boot, particularly when using multi_v5_defconfig in QEMU under the palmetto-bmc machine, but it can affect real hardware running affected kernel versions. The vulnerability is due to improper conditional checks before dereferencing pointers, and the fix involves moving the rmii_en assignment below a machine check to ensure it only executes on supported SoCs. This vulnerability does not have known exploits in the wild and lacks a CVSS score, but it can cause denial of service by crashing the kernel during boot or initialization.
Potential Impact
For European organizations, the impact of CVE-2021-47631 is primarily related to availability. Systems running affected Linux kernel versions on ARM-based davinci SoCs, such as da850-evm boards, may experience kernel panics and boot failures, leading to downtime. This can disrupt embedded systems, industrial control devices, or specialized hardware platforms using these SoCs. While the vulnerability does not directly expose confidentiality or integrity risks, the denial of service caused by kernel crashes can affect operational continuity, especially in critical infrastructure or manufacturing environments where embedded Linux devices are common. Since the vulnerability occurs early in the boot process, recovery may require physical access or remote management capabilities to restore system functionality. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental crashes or targeted disruption attempts.
Mitigation Recommendations
To mitigate CVE-2021-47631, organizations should: 1) Identify and inventory devices running Linux kernels with the affected ARM davinci SoC support, particularly da850-evm or similar platforms. 2) Apply the official Linux kernel patches that move the rmii_en assignment below the machine check in da850_evm_config_emac(), ensuring the pointer dereference only occurs on supported SoCs. 3) Update to a Linux kernel version that includes this fix, preferably from a trusted vendor or distribution with backported patches. 4) For embedded or specialized devices where kernel updates are challenging, consider recompiling the kernel with the patch or disabling the problematic driver if not required. 5) Implement monitoring to detect kernel panics or boot failures indicative of this issue. 6) Maintain secure remote management and recovery procedures to restore affected devices without physical access. 7) Test updates in controlled environments to avoid disruptions in production systems.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden, Finland
CVE-2021-47631: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ARM: davinci: da850-evm: Avoid NULL pointer dereference With newer versions of GCC, there is a panic in da850_evm_config_emac() when booting multi_v5_defconfig in QEMU under the palmetto-bmc machine: Unable to handle kernel NULL pointer dereference at virtual address 00000020 pgd = (ptrval) [00000020] *pgd=00000000 Internal error: Oops: 5 [#1] PREEMPT ARM Modules linked in: CPU: 0 PID: 1 Comm: swapper Not tainted 5.15.0 #1 Hardware name: Generic DT based system PC is at da850_evm_config_emac+0x1c/0x120 LR is at do_one_initcall+0x50/0x1e0 The emac_pdata pointer in soc_info is NULL because davinci_soc_info only gets populated on davinci machines but da850_evm_config_emac() is called on all machines via device_initcall(). Move the rmii_en assignment below the machine check so that it is only dereferenced when running on a supported SoC.
AI-Powered Analysis
Technical Analysis
CVE-2021-47631 is a vulnerability identified in the Linux kernel specifically affecting ARM architecture platforms using the davinci SoC family, notably the da850-evm board. The issue arises from a NULL pointer dereference in the da850_evm_config_emac() function during the initialization phase of the Ethernet MAC (emac) driver. The root cause is that the emac_pdata pointer within the soc_info structure is NULL because davinci_soc_info is only populated for davinci machines, but the da850_evm_config_emac() function is invoked on all machines via device_initcall(). This leads to an attempt to dereference a NULL pointer when assigning the rmii_en field, causing a kernel panic and system crash. The problem is triggered during boot, particularly when using multi_v5_defconfig in QEMU under the palmetto-bmc machine, but it can affect real hardware running affected kernel versions. The vulnerability is due to improper conditional checks before dereferencing pointers, and the fix involves moving the rmii_en assignment below a machine check to ensure it only executes on supported SoCs. This vulnerability does not have known exploits in the wild and lacks a CVSS score, but it can cause denial of service by crashing the kernel during boot or initialization.
Potential Impact
For European organizations, the impact of CVE-2021-47631 is primarily related to availability. Systems running affected Linux kernel versions on ARM-based davinci SoCs, such as da850-evm boards, may experience kernel panics and boot failures, leading to downtime. This can disrupt embedded systems, industrial control devices, or specialized hardware platforms using these SoCs. While the vulnerability does not directly expose confidentiality or integrity risks, the denial of service caused by kernel crashes can affect operational continuity, especially in critical infrastructure or manufacturing environments where embedded Linux devices are common. Since the vulnerability occurs early in the boot process, recovery may require physical access or remote management capabilities to restore system functionality. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental crashes or targeted disruption attempts.
Mitigation Recommendations
To mitigate CVE-2021-47631, organizations should: 1) Identify and inventory devices running Linux kernels with the affected ARM davinci SoC support, particularly da850-evm or similar platforms. 2) Apply the official Linux kernel patches that move the rmii_en assignment below the machine check in da850_evm_config_emac(), ensuring the pointer dereference only occurs on supported SoCs. 3) Update to a Linux kernel version that includes this fix, preferably from a trusted vendor or distribution with backported patches. 4) For embedded or specialized devices where kernel updates are challenging, consider recompiling the kernel with the patch or disabling the problematic driver if not required. 5) Implement monitoring to detect kernel panics or boot failures indicative of this issue. 6) Maintain secure remote management and recovery procedures to restore affected devices without physical access. 7) Test updates in controlled environments to avoid disruptions in production systems.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T01:48:21.518Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9834c4522896dcbe9615
Added to database: 5/21/2025, 9:09:08 AM
Last enriched: 6/30/2025, 3:40:26 PM
Last updated: 7/31/2025, 8:22:01 PM
Views: 10
Related Threats
CVE-2025-9104: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9102: Improper Export of Android Application Components in 1&1 Mail & Media mail.com App
MediumCVE-2025-9101: Cross Site Scripting in zhenfeng13 My-Blog
MediumCVE-2025-9100: Authentication Bypass by Capture-replay in zhenfeng13 My-Blog
MediumCVE-2025-9099: Unrestricted Upload in Acrel Environmental Monitoring Cloud Platform
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.