Skip to main content

CVE-2021-47534: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47534cvecve-2021-47534
Published: Fri May 24 2024 (05/24/2024, 15:09:43 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/vc4: kms: Add missing drm_crtc_commit_put Commit 9ec03d7f1ed3 ("drm/vc4: kms: Wait on previous FIFO users before a commit") introduced a global state for the HVS, with each FIFO storing the current CRTC commit so that we can properly synchronize commits. However, the refcounting was off and we thus ended up leaking the drm_crtc_commit structure every commit. Add a drm_crtc_commit_put to prevent the leakage.

AI-Powered Analysis

AILast updated: 06/30/2025, 14:25:51 UTC

Technical Analysis

CVE-2021-47534 is a vulnerability identified in the Linux kernel's Direct Rendering Manager (DRM) subsystem, specifically within the vc4 driver responsible for managing the VideoCore IV GPU used in some Broadcom SoCs. The issue stems from a missing reference decrement operation (drm_crtc_commit_put) in the commit synchronization logic introduced by commit 9ec03d7f1ed3. This commit added a global state for the Hardware Video Scaler (HVS) and implemented synchronization of FIFO queues by tracking the current CRTC (Cathode Ray Tube Controller) commit. However, the refcounting mechanism was flawed, causing a memory leak of the drm_crtc_commit structure on every commit operation. Although this vulnerability does not directly impact confidentiality or integrity, it affects availability by leaking kernel memory resources, which over time could lead to resource exhaustion and potential denial of service (DoS). The CVSS 3.1 score of 4.1 reflects a medium severity, with the attack vector being local (AV:L), requiring high complexity (AC:H), high privileges (PR:H), no user interaction (UI:N), and impacting availability only (A:H). There are no known exploits in the wild, and the vulnerability requires authenticated local access with elevated privileges, limiting its exploitation scope. The flaw is fixed by adding the missing drm_crtc_commit_put call to properly decrement the reference count and prevent the memory leak.

Potential Impact

For European organizations, the primary impact of CVE-2021-47534 is the potential for denial of service on systems running affected Linux kernel versions with the vc4 DRM driver enabled. This is particularly relevant for organizations using embedded Linux devices or servers that utilize Broadcom VideoCore IV GPUs, such as certain Raspberry Pi models or other ARM-based platforms common in industrial, IoT, or edge computing environments. While the vulnerability does not allow unauthorized data access or code execution, persistent memory leaks can degrade system stability and availability, potentially interrupting critical services or operations. Organizations relying on Linux-based infrastructure for media processing, digital signage, or specialized hardware acceleration may experience increased maintenance overhead or unexpected downtime if the vulnerability is exploited or triggered by faulty software. Given the requirement for local high-privilege access, the threat is more significant in environments where multiple users have elevated privileges or where attackers have already gained partial access to systems.

Mitigation Recommendations

To mitigate CVE-2021-47534, European organizations should ensure that their Linux kernel versions are updated to include the patch that adds the missing drm_crtc_commit_put call. This involves applying the latest stable kernel updates from trusted Linux distributions or compiling the kernel with the fix if using custom builds. Organizations should audit systems running the vc4 DRM driver to identify affected devices, especially embedded or ARM-based platforms. Restricting local access to trusted users and enforcing the principle of least privilege can reduce the risk of exploitation, as the vulnerability requires high privileges. Additionally, monitoring system logs and kernel memory usage can help detect abnormal resource consumption indicative of memory leaks. For critical systems, implementing automated patch management and testing procedures will ensure timely deployment of fixes. Finally, organizations should consider isolating or segmenting devices with the affected hardware to limit potential impact.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-24T15:02:54.826Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9833c4522896dcbe93d4

Added to database: 5/21/2025, 9:09:07 AM

Last enriched: 6/30/2025, 2:25:51 PM

Last updated: 8/12/2025, 10:05:38 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats