CVE-2021-47258

In the Linux kernel, the following vulnerability has been resolved: scsi: core: Fix error handling of scsi_host_alloc() After device is initialized via device_initialize(), or its name is set via dev_set_name(), the device has to be freed via put_device(). Otherwise device name will be leaked because it is allocated dynamically in dev_set_name(). Fix the leak by replacing kfree() with put_device(). Since scsi_host_dev_release() properly handles IDA and kthread removal, remove special-casing these from the error handling as well.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*

History

30 Apr 2025, 15:05

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE CWE-401
References () https://git.kernel.org/stable/c/2dc85045ae65b9302a1d2e2ddd7ce4c030153a6a - () https://git.kernel.org/stable/c/2dc85045ae65b9302a1d2e2ddd7ce4c030153a6a - Patch
References () https://git.kernel.org/stable/c/45d83db4728127944b237c0c8248987df9d478e7 - () https://git.kernel.org/stable/c/45d83db4728127944b237c0c8248987df9d478e7 - Patch
References () https://git.kernel.org/stable/c/66a834d092930cf41d809c0e989b13cd6f9ca006 - () https://git.kernel.org/stable/c/66a834d092930cf41d809c0e989b13cd6f9ca006 - Patch
References () https://git.kernel.org/stable/c/79296e292d67fa7b5fb8d8c27343683e823872c8 - () https://git.kernel.org/stable/c/79296e292d67fa7b5fb8d8c27343683e823872c8 - Patch
References () https://git.kernel.org/stable/c/7a696ce1d5d16a33a6cd6400bbcc0339b2460e11 - () https://git.kernel.org/stable/c/7a696ce1d5d16a33a6cd6400bbcc0339b2460e11 - Patch
References () https://git.kernel.org/stable/c/8958181c1663e24a13434448e7d6b96b5d04900a - () https://git.kernel.org/stable/c/8958181c1663e24a13434448e7d6b96b5d04900a - Patch
References () https://git.kernel.org/stable/c/db08ce595dd64ea9859f7d088b51cbfc8e685c66 - () https://git.kernel.org/stable/c/db08ce595dd64ea9859f7d088b51cbfc8e685c66 - Patch

21 Nov 2024, 06:35

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: core: corrige el manejo de errores de scsi_host_alloc(). Después de que el dispositivo se inicializa mediante device_initialize(), o su nombre se establece mediante dev_set_name(), el dispositivo debe liberarse mediante put_device (). De lo contrario, se filtrará el nombre del dispositivo porque se asigna dinámicamente en dev_set_name(). Solucione la fuga reemplazando kfree() con put_device(). Dado que scsi_host_dev_release() maneja adecuadamente la eliminación de IDA y kthread, elimine también estas mayúsculas y minúsculas especiales del manejo de errores.
References () https://git.kernel.org/stable/c/2dc85045ae65b9302a1d2e2ddd7ce4c030153a6a - () https://git.kernel.org/stable/c/2dc85045ae65b9302a1d2e2ddd7ce4c030153a6a -
References () https://git.kernel.org/stable/c/45d83db4728127944b237c0c8248987df9d478e7 - () https://git.kernel.org/stable/c/45d83db4728127944b237c0c8248987df9d478e7 -
References () https://git.kernel.org/stable/c/66a834d092930cf41d809c0e989b13cd6f9ca006 - () https://git.kernel.org/stable/c/66a834d092930cf41d809c0e989b13cd6f9ca006 -
References () https://git.kernel.org/stable/c/79296e292d67fa7b5fb8d8c27343683e823872c8 - () https://git.kernel.org/stable/c/79296e292d67fa7b5fb8d8c27343683e823872c8 -
References () https://git.kernel.org/stable/c/7a696ce1d5d16a33a6cd6400bbcc0339b2460e11 - () https://git.kernel.org/stable/c/7a696ce1d5d16a33a6cd6400bbcc0339b2460e11 -
References () https://git.kernel.org/stable/c/8958181c1663e24a13434448e7d6b96b5d04900a - () https://git.kernel.org/stable/c/8958181c1663e24a13434448e7d6b96b5d04900a -
References () https://git.kernel.org/stable/c/db08ce595dd64ea9859f7d088b51cbfc8e685c66 - () https://git.kernel.org/stable/c/db08ce595dd64ea9859f7d088b51cbfc8e685c66 -

21 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 15:15

Updated : 2025-04-30 15:05


NVD link : CVE-2021-47258

Mitre link : CVE-2021-47258

CVE.ORG link : CVE-2021-47258


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime