CVE-2021-47642

7.8 HIGH

📋 TL;DR

This CVE describes a buffer overflow vulnerability in the NVIDIA framebuffer driver (nvidiafb) in the Linux kernel. The vulnerability allows an attacker with local access to potentially execute arbitrary code or cause a denial of service by exploiting improper string copying. Systems running affected Linux kernel versions with NVIDIA framebuffer support enabled are at risk.

💻 Affected Systems

Products:
  • Linux kernel with NVIDIA framebuffer driver (nvidiafb)
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if NVIDIA framebuffer driver is loaded and used. Many systems use alternative display drivers.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to root, allowing complete system compromise and potential lateral movement within the environment.

🟠

Likely Case

Kernel panic leading to denial of service, requiring system reboot to restore functionality.

🟢

If Mitigated

Minimal impact if proper access controls prevent local attackers from accessing the vulnerable interface.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring access to the system, not directly exploitable over the network.
🏢 Internal Only: MEDIUM - Internal attackers with local access could exploit this, but requires specific kernel configuration and NVIDIA framebuffer usage.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of how to trigger the vulnerable code path. No known public exploits.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel versions containing the fix commits (e.g., 055cdd2e7b992921424d4daaa285ced787fb205f and related)

Vendor Advisory: https://git.kernel.org/stable/c/055cdd2e7b992921424d4daaa285ced787fb205f

Restart Required: No

Instructions:

1. Update Linux kernel to a version containing the fix. 2. For distributions: Use package manager (apt/yum/dnf) to install latest kernel updates. 3. Reboot to load new kernel if not using kexec or livepatch.

🔧 Temporary Workarounds

Disable NVIDIA framebuffer driver

all

Prevent loading of the vulnerable nvidiafb module

echo 'blacklist nvidiafb' >> /etc/modprobe.d/blacklist.conf
rmmod nvidiafb

🧯 If You Can't Patch

  • Restrict local access to prevent potential attackers from reaching the system
  • Implement strict privilege separation to limit damage if exploited

🔍 How to Verify

Check if Vulnerable:

Check if nvidiafb module is loaded: lsmod | grep nvidiafb AND check kernel version against patched versions

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated beyond fix commits and nvidiafb module uses strscpy instead of strcpy in nvidia_setup_i2c_bus function

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages
  • System crashes/reboots without clear cause

Network Indicators:

  • None - local vulnerability only

SIEM Query:

Search for kernel panic events or unexpected system reboots in system logs

🔗 References

📤 Share & Export