First published: Tue May 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: iommu/arm-smmu: Fix arm_smmu_device refcount leak when arm_smmu_rpm_get fails arm_smmu_rpm_get() invokes pm_runtime_get_sync(), which increases the refcount of the "smmu" even though the return value is less than 0. The reference counting issue happens in some error handling paths of arm_smmu_rpm_get() in its caller functions. When arm_smmu_rpm_get() fails, the caller functions forget to decrease the refcount of "smmu" increased by arm_smmu_rpm_get(), causing a refcount leak. Fix this issue by calling pm_runtime_resume_and_get() instead of pm_runtime_get_sync() in arm_smmu_rpm_get(), which can keep the refcount balanced in case of failure.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | <5.4.134 | |
Linux Kernel | >=5.5<5.10.52 | |
Linux Kernel | >=5.11<5.12.19 | |
Linux Kernel | >=5.13<5.13.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47327 is categorized as a medium-severity vulnerability affecting the Linux kernel.
To mitigate CVE-2021-47327, upgrade to a patched version of the Linux kernel beyond the versions listed in the vulnerability description.
CVE-2021-47327 affects various Linux kernel versions up to 5.4.134 and between 5.5 and 5.13.4.
The impact of CVE-2021-47327 includes a reference count leak in the arm_smmu_device, potentially leading to resource mismanagement.
Yes, CVE-2021-47327 specifically addresses a vulnerability in the ARM System Memory Management Unit (SMMU) functionality of the Linux kernel.