CVE-2021-47173: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: misc/uss720: fix memory leak in uss720_probe uss720_probe forgets to decrease the refcount of usbdev in uss720_probe. Fix this by decreasing the refcount of usbdev by usb_put_dev. BUG: memory leak unreferenced object 0xffff888101113800 (size 2048): comm "kworker/0:1", pid 7, jiffies 4294956777 (age 28.870s) hex dump (first 32 bytes): ff ff ff ff 31 00 00 00 00 00 00 00 00 00 00 00 ....1........... 00 00 00 00 00 00 00 00 00 00 00 00 03 00 00 00 ................ backtrace: [<ffffffff82b8e822>] kmalloc include/linux/slab.h:554 [inline] [<ffffffff82b8e822>] kzalloc include/linux/slab.h:684 [inline] [<ffffffff82b8e822>] usb_alloc_dev+0x32/0x450 drivers/usb/core/usb.c:582 [<ffffffff82b98441>] hub_port_connect drivers/usb/core/hub.c:5129 [inline] [<ffffffff82b98441>] hub_port_connect_change drivers/usb/core/hub.c:5363 [inline] [<ffffffff82b98441>] port_event drivers/usb/core/hub.c:5509 [inline] [<ffffffff82b98441>] hub_event+0x1171/0x20c0 drivers/usb/core/hub.c:5591 [<ffffffff81259229>] process_one_work+0x2c9/0x600 kernel/workqueue.c:2275 [<ffffffff81259b19>] worker_thread+0x59/0x5d0 kernel/workqueue.c:2421 [<ffffffff81261228>] kthread+0x178/0x1b0 kernel/kthread.c:292 [<ffffffff8100227f>] ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:294
AI Analysis
Technical Summary
CVE-2021-47173 is a vulnerability identified in the Linux kernel specifically related to the USB subsystem driver for the uss720 device. The issue arises in the function uss720_probe, where the reference count of the usbdev object is not properly decremented, leading to a memory leak. The root cause is that the probe function forgets to call usb_put_dev to decrease the reference count of the usbdev structure after it is no longer needed. This results in unreferenced kernel memory objects that remain allocated, as evidenced by the kernel debug output showing unreferenced objects and a backtrace pointing to usb_alloc_dev and hub event handling functions. The memory leak occurs during USB device connection events handled by the kernel's USB core and hub drivers. Although this vulnerability does not directly allow code execution or privilege escalation, the leak can degrade system stability and performance over time, especially on systems with frequent USB device connect/disconnect events. The leak size is relatively small (2048 bytes per occurrence), but repeated leaks can accumulate, potentially leading to resource exhaustion and denial of service (DoS) conditions. The vulnerability affects Linux kernel versions identified by the commit hash 0f36163d3abefbda1b21a330b3fdf3c2dc076d94 and possibly others in the same code lineage. There are no known exploits in the wild at this time, and no CVSS score has been assigned. The fix involves adding the missing usb_put_dev call to properly manage the usbdev reference count and prevent the leak.
Potential Impact
For European organizations, the primary impact of this vulnerability is on system reliability and availability rather than direct compromise of confidentiality or integrity. Systems running vulnerable Linux kernels with the affected USB driver could experience gradual memory leaks leading to kernel memory exhaustion, causing system slowdowns, instability, or crashes. This is particularly relevant for servers, embedded systems, or critical infrastructure devices that rely on stable Linux kernel operation and frequently interact with USB devices. Organizations with high USB device turnover or those using the uss720 USB device driver are at greater risk. While no direct exploitation for privilege escalation or remote code execution is known, the resulting denial of service could disrupt business operations, especially in environments with limited physical access or automated systems. The impact is more pronounced in sectors such as manufacturing, telecommunications, and public services where Linux-based systems are prevalent and uptime is critical.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify and inventory Linux systems running kernels that include the vulnerable uss720 USB driver version. 2) Apply the official Linux kernel patches or updates that include the fix for CVE-2021-47173 as soon as they become available from their Linux distribution vendors or the mainline kernel. 3) If immediate patching is not possible, consider minimizing USB device connect/disconnect events on affected systems to reduce leak occurrence. 4) Monitor system logs and kernel memory usage for signs of memory leaks or instability related to USB events. 5) Employ kernel live patching solutions where supported to apply fixes without rebooting critical systems. 6) For embedded or specialized devices, coordinate with hardware vendors to obtain updated firmware or kernel versions addressing this issue. 7) Implement robust system monitoring and alerting to detect early signs of resource exhaustion caused by memory leaks. These steps go beyond generic advice by focusing on the specific driver and kernel subsystem involved and emphasizing operational controls to reduce exposure while patching is pending.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland
CVE-2021-47173: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: misc/uss720: fix memory leak in uss720_probe uss720_probe forgets to decrease the refcount of usbdev in uss720_probe. Fix this by decreasing the refcount of usbdev by usb_put_dev. BUG: memory leak unreferenced object 0xffff888101113800 (size 2048): comm "kworker/0:1", pid 7, jiffies 4294956777 (age 28.870s) hex dump (first 32 bytes): ff ff ff ff 31 00 00 00 00 00 00 00 00 00 00 00 ....1........... 00 00 00 00 00 00 00 00 00 00 00 00 03 00 00 00 ................ backtrace: [<ffffffff82b8e822>] kmalloc include/linux/slab.h:554 [inline] [<ffffffff82b8e822>] kzalloc include/linux/slab.h:684 [inline] [<ffffffff82b8e822>] usb_alloc_dev+0x32/0x450 drivers/usb/core/usb.c:582 [<ffffffff82b98441>] hub_port_connect drivers/usb/core/hub.c:5129 [inline] [<ffffffff82b98441>] hub_port_connect_change drivers/usb/core/hub.c:5363 [inline] [<ffffffff82b98441>] port_event drivers/usb/core/hub.c:5509 [inline] [<ffffffff82b98441>] hub_event+0x1171/0x20c0 drivers/usb/core/hub.c:5591 [<ffffffff81259229>] process_one_work+0x2c9/0x600 kernel/workqueue.c:2275 [<ffffffff81259b19>] worker_thread+0x59/0x5d0 kernel/workqueue.c:2421 [<ffffffff81261228>] kthread+0x178/0x1b0 kernel/kthread.c:292 [<ffffffff8100227f>] ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:294
AI-Powered Analysis
Technical Analysis
CVE-2021-47173 is a vulnerability identified in the Linux kernel specifically related to the USB subsystem driver for the uss720 device. The issue arises in the function uss720_probe, where the reference count of the usbdev object is not properly decremented, leading to a memory leak. The root cause is that the probe function forgets to call usb_put_dev to decrease the reference count of the usbdev structure after it is no longer needed. This results in unreferenced kernel memory objects that remain allocated, as evidenced by the kernel debug output showing unreferenced objects and a backtrace pointing to usb_alloc_dev and hub event handling functions. The memory leak occurs during USB device connection events handled by the kernel's USB core and hub drivers. Although this vulnerability does not directly allow code execution or privilege escalation, the leak can degrade system stability and performance over time, especially on systems with frequent USB device connect/disconnect events. The leak size is relatively small (2048 bytes per occurrence), but repeated leaks can accumulate, potentially leading to resource exhaustion and denial of service (DoS) conditions. The vulnerability affects Linux kernel versions identified by the commit hash 0f36163d3abefbda1b21a330b3fdf3c2dc076d94 and possibly others in the same code lineage. There are no known exploits in the wild at this time, and no CVSS score has been assigned. The fix involves adding the missing usb_put_dev call to properly manage the usbdev reference count and prevent the leak.
Potential Impact
For European organizations, the primary impact of this vulnerability is on system reliability and availability rather than direct compromise of confidentiality or integrity. Systems running vulnerable Linux kernels with the affected USB driver could experience gradual memory leaks leading to kernel memory exhaustion, causing system slowdowns, instability, or crashes. This is particularly relevant for servers, embedded systems, or critical infrastructure devices that rely on stable Linux kernel operation and frequently interact with USB devices. Organizations with high USB device turnover or those using the uss720 USB device driver are at greater risk. While no direct exploitation for privilege escalation or remote code execution is known, the resulting denial of service could disrupt business operations, especially in environments with limited physical access or automated systems. The impact is more pronounced in sectors such as manufacturing, telecommunications, and public services where Linux-based systems are prevalent and uptime is critical.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify and inventory Linux systems running kernels that include the vulnerable uss720 USB driver version. 2) Apply the official Linux kernel patches or updates that include the fix for CVE-2021-47173 as soon as they become available from their Linux distribution vendors or the mainline kernel. 3) If immediate patching is not possible, consider minimizing USB device connect/disconnect events on affected systems to reduce leak occurrence. 4) Monitor system logs and kernel memory usage for signs of memory leaks or instability related to USB events. 5) Employ kernel live patching solutions where supported to apply fixes without rebooting critical systems. 6) For embedded or specialized devices, coordinate with hardware vendors to obtain updated firmware or kernel versions addressing this issue. 7) Implement robust system monitoring and alerting to detect early signs of resource exhaustion caused by memory leaks. These steps go beyond generic advice by focusing on the specific driver and kernel subsystem involved and emphasizing operational controls to reduce exposure while patching is pending.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-03-25T09:12:14.111Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9835c4522896dcbe9f68
Added to database: 5/21/2025, 9:09:09 AM
Last enriched: 6/26/2025, 6:20:36 PM
Last updated: 8/15/2025, 2:54:54 AM
Views: 19
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.