CVE-2021-47410: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: fix svm_migrate_fini warning Device manager releases device-specific resources when a driver disconnects from a device, devm_memunmap_pages and devm_release_mem_region calls in svm_migrate_fini are redundant. It causes below warning trace after patch "drm/amdgpu: Split amdgpu_device_fini into early and late", so remove function svm_migrate_fini. BUG: https://gitlab.freedesktop.org/drm/amd/-/issues/1718 WARNING: CPU: 1 PID: 3646 at drivers/base/devres.c:795 devm_release_action+0x51/0x60 Call Trace: ? memunmap_pages+0x360/0x360 svm_migrate_fini+0x2d/0x60 [amdgpu] kgd2kfd_device_exit+0x23/0xa0 [amdgpu] amdgpu_amdkfd_device_fini_sw+0x1d/0x30 [amdgpu] amdgpu_device_fini_sw+0x45/0x290 [amdgpu] amdgpu_driver_release_kms+0x12/0x30 [amdgpu] drm_dev_release+0x20/0x40 [drm] release_nodes+0x196/0x1e0 device_release_driver_internal+0x104/0x1d0 driver_detach+0x47/0x90 bus_remove_driver+0x7a/0xd0 pci_unregister_driver+0x3d/0x90 amdgpu_exit+0x11/0x20 [amdgpu]
AI Analysis
Technical Summary
CVE-2021-47410 is a vulnerability identified in the Linux kernel, specifically within the AMD GPU driver subsystem (amdgpu) related to device resource management during driver disconnection. The issue arises from redundant calls to devm_memunmap_pages and devm_release_mem_region functions within the svm_migrate_fini function. These redundant calls cause warning traces and potentially unstable behavior during device driver teardown. The root cause is linked to a patch that split amdgpu_device_fini into early and late phases, which made svm_migrate_fini obsolete and problematic. The vulnerability manifests as a kernel warning trace triggered during the release of device-specific resources when the AMD GPU driver disconnects from a device. The trace includes calls through devm_release_action and other kernel driver release functions, indicating improper resource management. Although this vulnerability does not appear to cause direct memory corruption or privilege escalation, the improper resource release can lead to kernel instability or crashes under certain conditions. The issue was reported and tracked in the freedesktop.org DRM AMD GitLab issue #1718 and has been addressed by removing the svm_migrate_fini function to prevent the redundant calls. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The vulnerability affects specific Linux kernel versions containing the identified commit hashes, primarily impacting systems running AMD GPU drivers on Linux kernels that include the problematic code.
Potential Impact
For European organizations, the impact of CVE-2021-47410 is primarily related to system stability and reliability rather than direct security breaches such as data leakage or privilege escalation. Organizations relying on Linux servers or workstations with AMD GPUs—particularly in environments where GPU compute or graphics capabilities are critical—may experience kernel warnings or crashes during driver unload or device removal operations. This can lead to service interruptions, reduced availability of GPU-accelerated applications, and potential downtime. Industries such as scientific research, media production, financial services using GPU compute, and cloud service providers with AMD GPU infrastructure could be affected. While the vulnerability does not currently enable remote exploitation or privilege escalation, the instability could be leveraged in complex attack chains or cause denial-of-service conditions. European organizations with strict uptime requirements or those running GPU-intensive workloads should be aware of this risk. The absence of known exploits reduces immediate threat levels, but the potential for kernel instability necessitates timely patching to maintain operational integrity.
Mitigation Recommendations
To mitigate CVE-2021-47410, European organizations should: 1) Apply the latest Linux kernel updates that remove the svm_migrate_fini function and fix the redundant resource release calls. This is the definitive fix and should be prioritized. 2) For environments where immediate kernel upgrades are challenging, consider temporarily disabling AMD GPU driver unload operations or avoid hot-unplugging AMD GPU devices to reduce the risk of triggering the warning and potential instability. 3) Monitor kernel logs for warning traces related to devm_release_action or svm_migrate_fini to detect if the vulnerable code path is being exercised. 4) Test GPU driver updates in staging environments before production deployment to ensure stability. 5) Maintain updated backups and implement robust system monitoring to quickly respond to any kernel crashes or service interruptions. 6) Coordinate with hardware vendors and Linux distribution maintainers to receive timely patches and advisories. These steps go beyond generic advice by focusing on operational practices specific to AMD GPU driver management and kernel stability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2021-47410: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: fix svm_migrate_fini warning Device manager releases device-specific resources when a driver disconnects from a device, devm_memunmap_pages and devm_release_mem_region calls in svm_migrate_fini are redundant. It causes below warning trace after patch "drm/amdgpu: Split amdgpu_device_fini into early and late", so remove function svm_migrate_fini. BUG: https://gitlab.freedesktop.org/drm/amd/-/issues/1718 WARNING: CPU: 1 PID: 3646 at drivers/base/devres.c:795 devm_release_action+0x51/0x60 Call Trace: ? memunmap_pages+0x360/0x360 svm_migrate_fini+0x2d/0x60 [amdgpu] kgd2kfd_device_exit+0x23/0xa0 [amdgpu] amdgpu_amdkfd_device_fini_sw+0x1d/0x30 [amdgpu] amdgpu_device_fini_sw+0x45/0x290 [amdgpu] amdgpu_driver_release_kms+0x12/0x30 [amdgpu] drm_dev_release+0x20/0x40 [drm] release_nodes+0x196/0x1e0 device_release_driver_internal+0x104/0x1d0 driver_detach+0x47/0x90 bus_remove_driver+0x7a/0xd0 pci_unregister_driver+0x3d/0x90 amdgpu_exit+0x11/0x20 [amdgpu]
AI-Powered Analysis
Technical Analysis
CVE-2021-47410 is a vulnerability identified in the Linux kernel, specifically within the AMD GPU driver subsystem (amdgpu) related to device resource management during driver disconnection. The issue arises from redundant calls to devm_memunmap_pages and devm_release_mem_region functions within the svm_migrate_fini function. These redundant calls cause warning traces and potentially unstable behavior during device driver teardown. The root cause is linked to a patch that split amdgpu_device_fini into early and late phases, which made svm_migrate_fini obsolete and problematic. The vulnerability manifests as a kernel warning trace triggered during the release of device-specific resources when the AMD GPU driver disconnects from a device. The trace includes calls through devm_release_action and other kernel driver release functions, indicating improper resource management. Although this vulnerability does not appear to cause direct memory corruption or privilege escalation, the improper resource release can lead to kernel instability or crashes under certain conditions. The issue was reported and tracked in the freedesktop.org DRM AMD GitLab issue #1718 and has been addressed by removing the svm_migrate_fini function to prevent the redundant calls. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The vulnerability affects specific Linux kernel versions containing the identified commit hashes, primarily impacting systems running AMD GPU drivers on Linux kernels that include the problematic code.
Potential Impact
For European organizations, the impact of CVE-2021-47410 is primarily related to system stability and reliability rather than direct security breaches such as data leakage or privilege escalation. Organizations relying on Linux servers or workstations with AMD GPUs—particularly in environments where GPU compute or graphics capabilities are critical—may experience kernel warnings or crashes during driver unload or device removal operations. This can lead to service interruptions, reduced availability of GPU-accelerated applications, and potential downtime. Industries such as scientific research, media production, financial services using GPU compute, and cloud service providers with AMD GPU infrastructure could be affected. While the vulnerability does not currently enable remote exploitation or privilege escalation, the instability could be leveraged in complex attack chains or cause denial-of-service conditions. European organizations with strict uptime requirements or those running GPU-intensive workloads should be aware of this risk. The absence of known exploits reduces immediate threat levels, but the potential for kernel instability necessitates timely patching to maintain operational integrity.
Mitigation Recommendations
To mitigate CVE-2021-47410, European organizations should: 1) Apply the latest Linux kernel updates that remove the svm_migrate_fini function and fix the redundant resource release calls. This is the definitive fix and should be prioritized. 2) For environments where immediate kernel upgrades are challenging, consider temporarily disabling AMD GPU driver unload operations or avoid hot-unplugging AMD GPU devices to reduce the risk of triggering the warning and potential instability. 3) Monitor kernel logs for warning traces related to devm_release_action or svm_migrate_fini to detect if the vulnerable code path is being exercised. 4) Test GPU driver updates in staging environments before production deployment to ensure stability. 5) Maintain updated backups and implement robust system monitoring to quickly respond to any kernel crashes or service interruptions. 6) Coordinate with hardware vendors and Linux distribution maintainers to receive timely patches and advisories. These steps go beyond generic advice by focusing on operational practices specific to AMD GPU driver management and kernel stability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-21T14:58:30.817Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9833c4522896dcbe9070
Added to database: 5/21/2025, 9:09:07 AM
Last enriched: 6/30/2025, 12:39:46 PM
Last updated: 8/13/2025, 8:19:22 PM
Views: 12
Related Threats
CVE-2025-9012: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumCVE-2025-9011: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumCVE-2025-9010: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-9009: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-31961: CWE-1220 Insufficient Granularity of Access Control in HCL Software Connections
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.