CVE-2021-47009

In the Linux kernel, the following vulnerability has been resolved: KEYS: trusted: Fix memory leak on object td Two error return paths are neglecting to free allocated object td, causing a memory leak. Fix this by returning via the error return path that securely kfree's td. Fixes clang scan-build warning: security/keys/trusted-keys/trusted_tpm1.c:496:10: warning: Potential memory leak [unix.Malloc]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.12:rc1:*:*:*:*:*:*

History

09 Dec 2024, 18:24

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.12:rc1:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-401
References () https://git.kernel.org/stable/c/1c4031014106aff48e1e686e40101c31eab5d44c - () https://git.kernel.org/stable/c/1c4031014106aff48e1e686e40101c31eab5d44c - Patch
References () https://git.kernel.org/stable/c/31c9a4b24d86cbb36ff0d7a085725a3b4f0138c8 - () https://git.kernel.org/stable/c/31c9a4b24d86cbb36ff0d7a085725a3b4f0138c8 - Patch
References () https://git.kernel.org/stable/c/3e24fbd37e72e8a67b74991970fecc82d14f57af - () https://git.kernel.org/stable/c/3e24fbd37e72e8a67b74991970fecc82d14f57af - Patch
References () https://git.kernel.org/stable/c/83a775d5f9bfda95b1c295f95a3a041a40c7f321 - () https://git.kernel.org/stable/c/83a775d5f9bfda95b1c295f95a3a041a40c7f321 - Patch
First Time Linux linux Kernel
Linux

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1c4031014106aff48e1e686e40101c31eab5d44c - () https://git.kernel.org/stable/c/1c4031014106aff48e1e686e40101c31eab5d44c -
References () https://git.kernel.org/stable/c/31c9a4b24d86cbb36ff0d7a085725a3b4f0138c8 - () https://git.kernel.org/stable/c/31c9a4b24d86cbb36ff0d7a085725a3b4f0138c8 -
References () https://git.kernel.org/stable/c/3e24fbd37e72e8a67b74991970fecc82d14f57af - () https://git.kernel.org/stable/c/3e24fbd37e72e8a67b74991970fecc82d14f57af -
References () https://git.kernel.org/stable/c/83a775d5f9bfda95b1c295f95a3a041a40c7f321 - () https://git.kernel.org/stable/c/83a775d5f9bfda95b1c295f95a3a041a40c7f321 -
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: LLAVES: confiable: corrige la pérdida de memoria en el objeto td. Dos rutas de retorno de error no liberan el objeto asignado td, lo que provoca una pérdida de memoria. Solucione este problema regresando a través de la ruta de retorno de error que segura el td. Corrige la advertencia de clang scan-build: seguridad/claves/trusted-keys/trusted_tpm1.c:496:10: advertencia: Posible pérdida de memoria [unix.Malloc]

28 Feb 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-28 09:15

Updated : 2024-12-09 18:24


NVD link : CVE-2021-47009

Mitre link : CVE-2021-47009

CVE.ORG link : CVE-2021-47009


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime