Skip to main content

CVE-2021-47144: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47144cvecve-2021-47144
Published: Mon Mar 25 2024 (03/25/2024, 09:07:41 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/amdgpu: fix refcount leak [Why] the gem object rfb->base.obj[0] is get according to num_planes in amdgpufb_create, but is not put according to num_planes [How] put rfb->base.obj[0] in amdgpu_fbdev_destroy according to num_planes

AI-Powered Analysis

AILast updated: 06/26/2025, 19:35:57 UTC

Technical Analysis

CVE-2021-47144 is a vulnerability identified in the Linux kernel, specifically within the AMD GPU driver component (drm/amd/amdgpu). The issue arises from a reference count leak related to the gem object rfb->base.obj[0]. In the function amdgpufb_create, this gem object is acquired multiple times based on the number of planes (num_planes), but the corresponding release (put) operations are not performed accordingly. This leads to a reference count leak, where the reference count of the object is artificially inflated and not decremented as expected. The fix involves ensuring that the gem object is properly released in the amdgpu_fbdev_destroy function, matching the number of acquisitions based on num_planes. This prevents the reference count leak and potential resource exhaustion. While the vulnerability does not appear to have known exploits in the wild, the improper management of reference counts in kernel drivers can lead to resource leaks that may degrade system stability or be leveraged in more complex attack chains. The vulnerability affects Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, indicating a specific patch or kernel version lineage. No CVSS score has been assigned to this vulnerability yet, and no direct exploit code or detailed attack vectors have been publicly disclosed. However, the flaw resides in a critical component of the Linux kernel's graphics subsystem, which is widely used across many Linux distributions and environments.

Potential Impact

For European organizations, the impact of CVE-2021-47144 primarily revolves around potential system stability and reliability issues rather than immediate direct compromise. Systems running Linux kernels with the vulnerable AMD GPU driver may experience resource leaks that could lead to degraded performance or crashes in graphics-related operations. This can affect workstations, servers, or embedded systems relying on AMD GPUs for graphical processing. In environments where Linux is used for critical infrastructure, such as in research institutions, media production, or industrial control systems, such instability could disrupt operations. Although no direct remote code execution or privilege escalation is documented, the vulnerability could be a stepping stone in multi-stage attacks if combined with other flaws. European organizations with large Linux deployments, especially those using AMD GPUs, should be aware of this risk. The lack of known exploits reduces immediate urgency but does not eliminate the need for patching to maintain system integrity and prevent potential future exploitation.

Mitigation Recommendations

Organizations should prioritize updating their Linux kernel to versions that include the fix for CVE-2021-47144. Specifically, applying the patch that ensures proper reference count management in the amdgpu driver is essential. System administrators should: 1) Identify all Linux systems using AMD GPU drivers, particularly those running kernel versions prior to the patch commit indicated. 2) Schedule kernel upgrades during maintenance windows to minimize disruption. 3) Validate that the updated kernel version properly includes the fix by reviewing kernel changelogs or vendor advisories. 4) Monitor system logs for any unusual GPU driver errors or resource exhaustion symptoms that might indicate lingering issues. 5) For critical systems, consider implementing additional monitoring of GPU driver health and resource usage. 6) Engage with Linux distribution vendors or support channels to ensure timely receipt of security updates. Since this vulnerability involves kernel-level resource management, generic mitigations like application-level controls are insufficient; patching is the definitive solution.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-03-04T18:12:48.844Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9834c4522896dcbe9e8f

Added to database: 5/21/2025, 9:09:08 AM

Last enriched: 6/26/2025, 7:35:57 PM

Last updated: 8/15/2025, 10:22:13 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats