CVE-2021-47499: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove When ACPI type is ACPI_SMO8500, the data->dready_trig will not be set, the memory allocated by iio_triggered_buffer_setup() will not be freed, and cause memory leak as follows: unreferenced object 0xffff888009551400 (size 512): comm "i2c-SMO8500-125", pid 911, jiffies 4294911787 (age 83.852s) hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 20 e2 e5 c0 ff ff ff ff ........ ....... backtrace: [<0000000041ce75ee>] kmem_cache_alloc_trace+0x16d/0x360 [<000000000aeb17b0>] iio_kfifo_allocate+0x41/0x130 [kfifo_buf] [<000000004b40c1f5>] iio_triggered_buffer_setup_ext+0x2c/0x210 [industrialio_triggered_buffer] [<000000004375b15f>] kxcjk1013_probe+0x10c3/0x1d81 [kxcjk_1013] Fix it by remove data->dready_trig condition in probe and remove.
AI Analysis
Technical Summary
CVE-2021-47499 is a vulnerability identified in the Linux kernel specifically within the Industrial I/O (IIO) subsystem's accelerometer driver for the kxcjk-1013 sensor. The issue arises when the ACPI (Advanced Configuration and Power Interface) type is ACPI_SMO8500. Under this condition, the data structure member 'dready_trig' is not set during the driver's probe function. This omission leads to a failure to free memory allocated by the function iio_triggered_buffer_setup(), resulting in a memory leak. The vulnerability is characterized by unreferenced kernel memory objects, which accumulate over time as the driver repeatedly allocates memory without releasing it. The technical root cause is the conditional check on data->dready_trig in the probe and remove functions, which was removed in the patch to ensure proper cleanup. The memory leak is demonstrated by kernel debug information showing unreferenced objects and a backtrace through kernel functions such as kmem_cache_alloc_trace, iio_kfifo_allocate, and kxcjk1013_probe. This vulnerability does not appear to have known exploits in the wild and does not have an assigned CVSS score. However, it affects Linux kernel versions identified by the commit hash a25691c1f9674090fb66586cf4c5d60d3efdf339 and potentially others in the same code lineage. The flaw is primarily a resource management bug that could lead to gradual degradation of system stability or denial of service due to kernel memory exhaustion if the vulnerable driver is repeatedly probed or used under the specified ACPI condition.
Potential Impact
For European organizations, the impact of CVE-2021-47499 is primarily related to system reliability and availability. Systems running Linux kernels with the vulnerable kxcjk-1013 accelerometer driver and configured with ACPI_SMO8500 devices may experience memory leaks that degrade performance over time, potentially leading to kernel crashes or system reboots. This can affect embedded systems, industrial control devices, or IoT devices that rely on this specific sensor driver, especially in sectors such as manufacturing, automotive, or critical infrastructure where Linux is commonly used in embedded environments. While the vulnerability does not directly expose confidentiality or integrity risks, the availability impact could disrupt operations, cause downtime, or require unscheduled maintenance. Since no known exploits exist, the immediate risk is low, but unpatched systems remain vulnerable to stability issues. European organizations with extensive Linux deployments in industrial or embedded contexts should be aware of this risk, as it could affect operational technology (OT) environments and critical systems that depend on continuous uptime.
Mitigation Recommendations
To mitigate CVE-2021-47499, organizations should: 1) Apply the official Linux kernel patches that remove the conditional check on data->dready_trig in the probe and remove functions of the kxcjk-1013 driver, ensuring proper memory cleanup. 2) Update Linux kernel versions to those including the fix, ideally from the vendor or distribution maintainers providing patched kernel releases. 3) Audit systems to identify devices using the kxcjk-1013 accelerometer driver and verify if the ACPI_SMO8500 type is present, prioritizing updates on affected devices. 4) Monitor system logs and kernel memory usage for signs of memory leaks or instability related to the IIO subsystem. 5) For embedded or industrial devices where kernel updates are challenging, consider workarounds such as disabling the affected driver if not required or isolating vulnerable devices from critical networks. 6) Implement robust system monitoring and automated reboot policies to mitigate impact from potential memory exhaustion until patches can be applied. These steps go beyond generic advice by focusing on device-specific identification, patch application, and operational monitoring tailored to the nature of this kernel memory leak.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden, Finland
CVE-2021-47499: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove When ACPI type is ACPI_SMO8500, the data->dready_trig will not be set, the memory allocated by iio_triggered_buffer_setup() will not be freed, and cause memory leak as follows: unreferenced object 0xffff888009551400 (size 512): comm "i2c-SMO8500-125", pid 911, jiffies 4294911787 (age 83.852s) hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 20 e2 e5 c0 ff ff ff ff ........ ....... backtrace: [<0000000041ce75ee>] kmem_cache_alloc_trace+0x16d/0x360 [<000000000aeb17b0>] iio_kfifo_allocate+0x41/0x130 [kfifo_buf] [<000000004b40c1f5>] iio_triggered_buffer_setup_ext+0x2c/0x210 [industrialio_triggered_buffer] [<000000004375b15f>] kxcjk1013_probe+0x10c3/0x1d81 [kxcjk_1013] Fix it by remove data->dready_trig condition in probe and remove.
AI-Powered Analysis
Technical Analysis
CVE-2021-47499 is a vulnerability identified in the Linux kernel specifically within the Industrial I/O (IIO) subsystem's accelerometer driver for the kxcjk-1013 sensor. The issue arises when the ACPI (Advanced Configuration and Power Interface) type is ACPI_SMO8500. Under this condition, the data structure member 'dready_trig' is not set during the driver's probe function. This omission leads to a failure to free memory allocated by the function iio_triggered_buffer_setup(), resulting in a memory leak. The vulnerability is characterized by unreferenced kernel memory objects, which accumulate over time as the driver repeatedly allocates memory without releasing it. The technical root cause is the conditional check on data->dready_trig in the probe and remove functions, which was removed in the patch to ensure proper cleanup. The memory leak is demonstrated by kernel debug information showing unreferenced objects and a backtrace through kernel functions such as kmem_cache_alloc_trace, iio_kfifo_allocate, and kxcjk1013_probe. This vulnerability does not appear to have known exploits in the wild and does not have an assigned CVSS score. However, it affects Linux kernel versions identified by the commit hash a25691c1f9674090fb66586cf4c5d60d3efdf339 and potentially others in the same code lineage. The flaw is primarily a resource management bug that could lead to gradual degradation of system stability or denial of service due to kernel memory exhaustion if the vulnerable driver is repeatedly probed or used under the specified ACPI condition.
Potential Impact
For European organizations, the impact of CVE-2021-47499 is primarily related to system reliability and availability. Systems running Linux kernels with the vulnerable kxcjk-1013 accelerometer driver and configured with ACPI_SMO8500 devices may experience memory leaks that degrade performance over time, potentially leading to kernel crashes or system reboots. This can affect embedded systems, industrial control devices, or IoT devices that rely on this specific sensor driver, especially in sectors such as manufacturing, automotive, or critical infrastructure where Linux is commonly used in embedded environments. While the vulnerability does not directly expose confidentiality or integrity risks, the availability impact could disrupt operations, cause downtime, or require unscheduled maintenance. Since no known exploits exist, the immediate risk is low, but unpatched systems remain vulnerable to stability issues. European organizations with extensive Linux deployments in industrial or embedded contexts should be aware of this risk, as it could affect operational technology (OT) environments and critical systems that depend on continuous uptime.
Mitigation Recommendations
To mitigate CVE-2021-47499, organizations should: 1) Apply the official Linux kernel patches that remove the conditional check on data->dready_trig in the probe and remove functions of the kxcjk-1013 driver, ensuring proper memory cleanup. 2) Update Linux kernel versions to those including the fix, ideally from the vendor or distribution maintainers providing patched kernel releases. 3) Audit systems to identify devices using the kxcjk-1013 accelerometer driver and verify if the ACPI_SMO8500 type is present, prioritizing updates on affected devices. 4) Monitor system logs and kernel memory usage for signs of memory leaks or instability related to the IIO subsystem. 5) For embedded or industrial devices where kernel updates are challenging, consider workarounds such as disabling the affected driver if not required or isolating vulnerable devices from critical networks. 6) Implement robust system monitoring and automated reboot policies to mitigate impact from potential memory exhaustion until patches can be applied. These steps go beyond generic advice by focusing on device-specific identification, patch application, and operational monitoring tailored to the nature of this kernel memory leak.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-22T06:20:56.204Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9833c4522896dcbe92b5
Added to database: 5/21/2025, 9:09:07 AM
Last enriched: 6/30/2025, 1:42:45 PM
Last updated: 7/26/2025, 10:20:46 PM
Views: 11
Related Threats
CVE-2025-49559: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22) in Adobe Adobe Commerce
MediumCVE-2025-49558: Time-of-check Time-of-use (TOCTOU) Race Condition (CWE-367) in Adobe Adobe Commerce
MediumCVE-2025-49557: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Commerce
HighCVE-2025-49556: Incorrect Authorization (CWE-863) in Adobe Adobe Commerce
HighCVE-2025-49555: Cross-Site Request Forgery (CSRF) (CWE-352) in Adobe Adobe Commerce
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.