Skip to main content

CVE-2021-47057: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47057cvecve-2021-47057
Published: Thu Feb 29 2024 (02/29/2024, 22:37:32 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map In the case where the dma_iv mapping fails, the return error path leaks the memory allocated to object d. Fix this by adding a new error return label and jumping to this to ensure d is free'd before the return. Addresses-Coverity: ("Resource leak")

AI-Powered Analysis

AILast updated: 06/30/2025, 20:27:10 UTC

Technical Analysis

CVE-2021-47057 is a medium-severity vulnerability identified in the Linux kernel, specifically within the crypto subsystem module sun8i-ss. The issue arises from a memory leak caused when the dma_iv (Direct Memory Access Initialization Vector) mapping operation fails. In this failure scenario, the kernel code does not properly free the allocated memory for the object 'd', leading to a resource leak. This vulnerability is categorized under CWE-770 (Allocation of Resources Without Limits or Throttling), indicating improper resource management. The root cause is a missing error handling path that should release the allocated memory before returning an error status. The fix involves adding a new error return label to ensure that the object 'd' is freed appropriately on failure of dma_iv mapping. The vulnerability does not impact confidentiality or integrity but affects availability due to resource exhaustion risks. The CVSS v3.1 base score is 5.5 (medium), with vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, meaning the attack requires local access with low complexity, privileges, and no user interaction, and it impacts availability only. There are no known exploits in the wild, and no public patches linked yet, but the issue has been acknowledged and fixed in the Linux kernel source. The affected versions correspond to specific Linux kernel commits identified by their hashes. This vulnerability is relevant to systems running the affected Linux kernel versions with the sun8i-ss crypto module enabled, which is commonly found in certain ARM-based SoCs used in embedded devices and some IoT hardware.

Potential Impact

For European organizations, the primary impact of CVE-2021-47057 lies in potential denial-of-service conditions caused by memory leaks in affected Linux systems. Organizations relying on embedded Linux devices or ARM-based hardware using the sun8i-ss crypto module could experience degraded system performance or crashes due to resource exhaustion. This could disrupt critical infrastructure, industrial control systems, or IoT deployments prevalent in sectors such as manufacturing, energy, and telecommunications. While the vulnerability does not allow data leakage or unauthorized code execution, the availability impact could lead to operational downtime, impacting business continuity and service reliability. European enterprises with large-scale deployments of embedded Linux devices, especially in environments where physical or remote local access is possible, should be vigilant. The requirement for local privileges limits remote exploitation, but insider threats or compromised local accounts could trigger the vulnerability. Given the growing adoption of Linux-based embedded systems in Europe, the risk is non-negligible for organizations with such infrastructure.

Mitigation Recommendations

To mitigate CVE-2021-47057, European organizations should: 1) Identify and inventory all Linux systems running kernel versions affected by this vulnerability, focusing on devices using the sun8i-ss crypto module, particularly ARM-based embedded devices. 2) Apply the official Linux kernel patches that address this memory leak as soon as they become available from trusted sources or Linux distributions. 3) For devices where kernel upgrades are not immediately feasible, implement monitoring for unusual memory consumption or resource exhaustion symptoms related to the crypto subsystem. 4) Restrict local access to trusted administrators and enforce least privilege principles to reduce the risk of exploitation by local attackers. 5) Employ host-based intrusion detection systems (HIDS) to detect anomalous behavior that could indicate attempts to trigger the vulnerability. 6) Engage with device vendors to ensure firmware updates include the fix, especially for embedded or IoT devices that may not receive regular kernel updates. 7) Incorporate this vulnerability into vulnerability management and patching workflows to ensure timely remediation and verification.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-29T22:33:44.294Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9834c4522896dcbe9bdf

Added to database: 5/21/2025, 9:09:08 AM

Last enriched: 6/30/2025, 8:27:10 PM

Last updated: 8/12/2025, 2:29:20 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats