Skip to main content

CVE-2021-47151: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47151cvecve-2021-47151
Published: Mon Mar 25 2024 (03/25/2024, 09:07:46 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: interconnect: qcom: bcm-voter: add a missing of_node_put() Add a missing of_node_put() in of_bcm_voter_get() to avoid the reference leak.

AI-Powered Analysis

AILast updated: 06/26/2025, 19:20:42 UTC

Technical Analysis

CVE-2021-47151 is a vulnerability identified in the Linux kernel, specifically within the interconnect subsystem related to Qualcomm's bcm-voter component. The issue arises from a missing call to of_node_put() in the function of_bcm_voter_get(). This missing call leads to a reference leak, meaning that the kernel fails to properly decrement the reference count on a device tree node object after it is no longer needed. Over time, such leaks can cause resource exhaustion within the kernel, potentially leading to degraded system performance or instability. The vulnerability does not directly allow for code execution or privilege escalation but represents a resource management flaw that could be exploited indirectly by causing denial of service conditions. The fix involves adding the missing of_node_put() call to ensure proper release of resources and prevent the leak. No known exploits are currently reported in the wild, and no CVSS score has been assigned to this vulnerability.

Potential Impact

For European organizations relying on Linux-based systems, especially those using kernels with Qualcomm interconnect components, this vulnerability could lead to system instability or denial of service due to resource leaks. This is particularly relevant for embedded systems, telecommunications infrastructure, and IoT devices that utilize Qualcomm hardware and run Linux kernels incorporating the bcm-voter interconnect driver. While the vulnerability does not directly compromise confidentiality or integrity, the availability of critical systems could be affected if resource exhaustion occurs. This could impact service continuity in sectors such as telecommunications, manufacturing, and critical infrastructure. Given the widespread use of Linux in servers and embedded devices across Europe, organizations should be aware of this vulnerability's potential to degrade system reliability if left unpatched.

Mitigation Recommendations

Organizations should promptly update their Linux kernel to a version that includes the patch fixing CVE-2021-47151. Since this vulnerability is a resource leak, monitoring system logs and kernel resource usage for abnormal patterns can help detect potential exploitation attempts. For embedded and IoT devices, ensure firmware updates are applied from vendors that have incorporated this fix. Additionally, implement strict access controls and limit untrusted user or process interactions with kernel interfaces related to the interconnect subsystem to reduce the risk of triggering the leak. Employing kernel hardening techniques and continuous system health monitoring will further mitigate the risk of denial of service caused by resource exhaustion.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-03-04T18:12:48.846Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9834c4522896dcbe9ec9

Added to database: 5/21/2025, 9:09:08 AM

Last enriched: 6/26/2025, 7:20:42 PM

Last updated: 8/15/2025, 3:07:54 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats