Skip to main content

CVE-2021-47420: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47420cvecve-2021-47420
Published: Tue May 21 2024 (05/21/2024, 15:04:08 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: fix a potential ttm->sg memory leak Memory is allocated for ttm->sg by kmalloc in kfd_mem_dmamap_userptr, but isn't freed by kfree in kfd_mem_dmaunmap_userptr. Free it!

AI-Powered Analysis

AILast updated: 06/30/2025, 12:41:51 UTC

Technical Analysis

CVE-2021-47420 is a vulnerability identified in the Linux kernel, specifically within the Direct Rendering Manager (DRM) subsystem related to AMD's Kernel Fusion Driver (amdkfd). The issue pertains to a memory management flaw where allocated memory for scatter-gather (sg) lists, associated with ttm (Translation Table Maps) objects, is not properly freed. In detail, memory is allocated using kmalloc in the function kfd_mem_dmamap_userptr but is not correspondingly freed in the function kfd_mem_dmaunmap_userptr, leading to a potential memory leak. This leak occurs because the allocated scatter-gather memory (ttm->sg) remains allocated even after it should have been released, which can cause gradual exhaustion of kernel memory resources over time. Although this vulnerability does not directly allow code execution or privilege escalation, the memory leak can degrade system performance and stability, potentially leading to denial of service (DoS) conditions if exploited at scale or on critical systems. The flaw affects Linux kernel versions identified by the commit hash 264fb4d332f5e76743818480e482464437837c52 and was publicly disclosed on May 21, 2024. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability is addressed by ensuring that the allocated memory is properly freed, thus preventing the leak.

Potential Impact

For European organizations, the impact of CVE-2021-47420 primarily revolves around system reliability and availability. Organizations running Linux servers, particularly those utilizing AMD GPUs or accelerators managed by the amdkfd driver (common in high-performance computing, AI workloads, and graphics-intensive applications), may experience gradual degradation of system resources due to memory leaks. This can lead to increased downtime, reduced performance, and potential denial of service if the leak is severe and sustained. Critical infrastructure, research institutions, and enterprises relying on Linux-based systems for compute-intensive tasks could be particularly affected. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can disrupt business operations and service delivery. Given the widespread use of Linux in European data centers, cloud environments, and embedded systems, the vulnerability warrants prompt attention to avoid operational disruptions.

Mitigation Recommendations

To mitigate CVE-2021-47420, European organizations should: 1) Apply the latest Linux kernel patches that address this memory leak as soon as they become available, ensuring that the amdkfd driver properly frees allocated memory. 2) Monitor system memory usage on Linux hosts running AMD GPU drivers to detect abnormal memory consumption patterns that may indicate exploitation or the presence of the leak. 3) Implement proactive system resource monitoring and alerting to identify early signs of memory exhaustion. 4) For critical systems, consider scheduling regular reboots or driver reloads as a temporary workaround to clear leaked memory until patches are applied. 5) Maintain an inventory of Linux systems using AMD GPUs or accelerators to prioritize patch deployment. 6) Engage with Linux distribution vendors or kernel maintainers to track patch releases and security advisories related to this vulnerability. 7) Incorporate this vulnerability into vulnerability management and incident response processes to ensure timely detection and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-21T14:58:30.820Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9833c4522896dcbe90cd

Added to database: 5/21/2025, 9:09:07 AM

Last enriched: 6/30/2025, 12:41:51 PM

Last updated: 7/25/2025, 4:36:21 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats