Skip to main content

CVE-2021-47455: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47455cvecve-2021-47455
Published: Wed May 22 2024 (05/22/2024, 06:19:44 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ptp: Fix possible memory leak in ptp_clock_register() I got memory leak as follows when doing fault injection test: unreferenced object 0xffff88800906c618 (size 8): comm "i2c-idt82p33931", pid 4421, jiffies 4294948083 (age 13.188s) hex dump (first 8 bytes): 70 74 70 30 00 00 00 00 ptp0.... backtrace: [<00000000312ed458>] __kmalloc_track_caller+0x19f/0x3a0 [<0000000079f6e2ff>] kvasprintf+0xb5/0x150 [<0000000026aae54f>] kvasprintf_const+0x60/0x190 [<00000000f323a5f7>] kobject_set_name_vargs+0x56/0x150 [<000000004e35abdd>] dev_set_name+0xc0/0x100 [<00000000f20cfe25>] ptp_clock_register+0x9f4/0xd30 [ptp] [<000000008bb9f0de>] idt82p33_probe.cold+0x8b6/0x1561 [ptp_idt82p33] When posix_clock_register() returns an error, the name allocated in dev_set_name() will be leaked, the put_device() should be used to give up the device reference, then the name will be freed in kobject_cleanup() and other memory will be freed in ptp_clock_release().

AI-Powered Analysis

AILast updated: 06/28/2025, 05:11:03 UTC

Technical Analysis

CVE-2021-47455 is a vulnerability identified in the Linux kernel's Precision Time Protocol (PTP) subsystem, specifically within the ptp_clock_register() function. The flaw is a memory leak that occurs when the posix_clock_register() call fails during the registration process of a PTP clock device. The issue arises because the device name allocated by dev_set_name() is not properly freed if an error occurs, leading to unreleased memory. The root cause is that the device reference is not relinquished via put_device(), which would normally trigger cleanup routines such as kobject_cleanup() to free the allocated name and other associated resources in ptp_clock_release(). This leak was discovered through fault injection testing and is evidenced by unreferenced kernel objects related to the PTP clock device. Although the vulnerability does not directly lead to code execution or privilege escalation, the memory leak can degrade system stability over time, especially on systems heavily utilizing PTP clocks, such as those in telecommunications or industrial control environments. The affected Linux kernel versions include multiple commits identified by their hashes, indicating the vulnerability spans several recent kernel builds. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2021-47455 is primarily related to system reliability and availability. Organizations that rely on Linux-based systems for critical infrastructure—such as telecommunications providers, industrial automation, energy sector companies, and financial institutions—may experience gradual memory exhaustion or degraded performance if the PTP subsystem is heavily used and the vulnerability is unpatched. This could lead to system slowdowns, crashes, or the need for more frequent reboots, potentially disrupting time-sensitive operations. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact could indirectly affect business continuity and operational efficiency. Given the widespread use of Linux in European data centers and embedded systems, unmitigated memory leaks could accumulate, especially in environments with long uptimes and high device registration activity.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize updating their Linux kernels to versions where the ptp_clock_register() memory leak has been fixed. Since the issue is related to error handling in device registration, applying the official patch or upgrading to a kernel version released after May 2024 that includes this fix is critical. Additionally, organizations should audit their systems for heavy usage of PTP clocks and monitor kernel memory usage patterns to detect abnormal leaks early. Implementing automated monitoring tools that track kernel memory consumption and device registration errors can provide early warning signs. For embedded or specialized systems where kernel upgrades are challenging, backporting the patch or applying vendor-provided fixes is recommended. Finally, system administrators should ensure that fault injection or stress testing is part of their regular security and stability assessments to uncover similar latent issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-21T14:58:30.833Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9822c4522896dcbde0f3

Added to database: 5/21/2025, 9:08:50 AM

Last enriched: 6/28/2025, 5:11:03 AM

Last updated: 8/15/2025, 7:18:08 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats