CVE-2021-47046

7.8 HIGH

📋 TL;DR

This CVE describes an off-by-one buffer overflow vulnerability in the Linux kernel's AMD display driver. The flaw allows reading one byte beyond the allocated buffer in the HDCP authentication process, potentially leading to kernel memory disclosure or system crashes. Systems running affected Linux kernel versions with AMD graphics hardware are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel with AMD display driver
Versions: Specific kernel versions containing the vulnerable code (check git commits for exact ranges)
Operating Systems: Linux distributions with affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires AMD graphics hardware and HDCP functionality to be active

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory disclosure leading to information leakage, privilege escalation, or system crash/DoS

🟠

Likely Case

System instability or crash when HDCP authentication is attempted with AMD graphics

🟢

If Mitigated

No impact if patched or HDCP functionality is disabled

🌐 Internet-Facing: LOW - Requires local access to graphics subsystem
🏢 Internal Only: MEDIUM - Local users or processes could trigger the vulnerability

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access to trigger HDCP authentication process

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing the referenced git commits

Vendor Advisory: https://git.kernel.org/stable/c/080bd41d6478a64edf96704fddcda52b1fd5fed7

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version 2. Reboot system 3. Verify kernel version matches patched release

🔧 Temporary Workarounds

Disable HDCP functionality

linux

Prevent HDCP authentication which triggers the vulnerable code path

echo 0 > /sys/module/amdgpu/parameters/hdcp_enable

🧯 If You Can't Patch

  • Restrict local user access to systems with AMD graphics
  • Disable AMD graphics driver or use alternative graphics hardware

🔍 How to Verify

Check if Vulnerable:

Check kernel version against affected ranges and verify AMD graphics driver is loaded

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the referenced git commit hashes

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages
  • AMD display driver crashes
  • HDCP authentication failures

SIEM Query:

source="kernel" AND ("amdgpu" OR "HDCP" OR "display") AND ("panic" OR "oops" OR "segfault")

🔗 References

📤 Share & Export