CVE-2021-47499

In the Linux kernel, the following vulnerability has been resolved: iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove When ACPI type is ACPI_SMO8500, the data->dready_trig will not be set, the memory allocated by iio_triggered_buffer_setup() will not be freed, and cause memory leak as follows: unreferenced object 0xffff888009551400 (size 512): comm "i2c-SMO8500-125", pid 911, jiffies 4294911787 (age 83.852s) hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 20 e2 e5 c0 ff ff ff ff ........ ....... backtrace: [<0000000041ce75ee>] kmem_cache_alloc_trace+0x16d/0x360 [<000000000aeb17b0>] iio_kfifo_allocate+0x41/0x130 [kfifo_buf] [<000000004b40c1f5>] iio_triggered_buffer_setup_ext+0x2c/0x210 [industrialio_triggered_buffer] [<000000004375b15f>] kxcjk1013_probe+0x10c3/0x1d81 [kxcjk_1013] Fix it by remove data->dready_trig condition in probe and remove.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*

History

06 Jan 2025, 20:45

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-401
References () https://git.kernel.org/stable/c/14508fe13b1c578b3d2ba574f1d48b351975860c - () https://git.kernel.org/stable/c/14508fe13b1c578b3d2ba574f1d48b351975860c - Patch
References () https://git.kernel.org/stable/c/3899700ddacbf7aaafadf44464fff3ff0d4e3307 - () https://git.kernel.org/stable/c/3899700ddacbf7aaafadf44464fff3ff0d4e3307 - Patch
References () https://git.kernel.org/stable/c/60a55b9d91ba99eb8cf015bc46dc2de05e168a15 - () https://git.kernel.org/stable/c/60a55b9d91ba99eb8cf015bc46dc2de05e168a15 - Patch
References () https://git.kernel.org/stable/c/70c9774e180d151abaab358108e3510a8e615215 - () https://git.kernel.org/stable/c/70c9774e180d151abaab358108e3510a8e615215 - Patch
References () https://git.kernel.org/stable/c/8c163a14277115ca962103910ab4cce55e862ffb - () https://git.kernel.org/stable/c/8c163a14277115ca962103910ab4cce55e862ffb - Patch
References () https://git.kernel.org/stable/c/8c1d43f3a3fc7184c42d7398bdf59a2a2903e4fc - () https://git.kernel.org/stable/c/8c1d43f3a3fc7184c42d7398bdf59a2a2903e4fc - Patch
References () https://git.kernel.org/stable/c/a3730f74159ad00a28960c0efe2a931fe6fe6b45 - () https://git.kernel.org/stable/c/a3730f74159ad00a28960c0efe2a931fe6fe6b45 - Patch
References () https://git.kernel.org/stable/c/ee86d0bad80bdcd11a87e188a596727f41b62320 - () https://git.kernel.org/stable/c/ee86d0bad80bdcd11a87e188a596727f41b62320 - Patch
First Time Linux
Linux linux Kernel

21 Nov 2024, 06:36

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/14508fe13b1c578b3d2ba574f1d48b351975860c - () https://git.kernel.org/stable/c/14508fe13b1c578b3d2ba574f1d48b351975860c -
References () https://git.kernel.org/stable/c/3899700ddacbf7aaafadf44464fff3ff0d4e3307 - () https://git.kernel.org/stable/c/3899700ddacbf7aaafadf44464fff3ff0d4e3307 -
References () https://git.kernel.org/stable/c/60a55b9d91ba99eb8cf015bc46dc2de05e168a15 - () https://git.kernel.org/stable/c/60a55b9d91ba99eb8cf015bc46dc2de05e168a15 -
References () https://git.kernel.org/stable/c/70c9774e180d151abaab358108e3510a8e615215 - () https://git.kernel.org/stable/c/70c9774e180d151abaab358108e3510a8e615215 -
References () https://git.kernel.org/stable/c/8c163a14277115ca962103910ab4cce55e862ffb - () https://git.kernel.org/stable/c/8c163a14277115ca962103910ab4cce55e862ffb -
References () https://git.kernel.org/stable/c/8c1d43f3a3fc7184c42d7398bdf59a2a2903e4fc - () https://git.kernel.org/stable/c/8c1d43f3a3fc7184c42d7398bdf59a2a2903e4fc -
References () https://git.kernel.org/stable/c/a3730f74159ad00a28960c0efe2a931fe6fe6b45 - () https://git.kernel.org/stable/c/a3730f74159ad00a28960c0efe2a931fe6fe6b45 -
References () https://git.kernel.org/stable/c/ee86d0bad80bdcd11a87e188a596727f41b62320 - () https://git.kernel.org/stable/c/ee86d0bad80bdcd11a87e188a596727f41b62320 -
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: iio: accel: kxcjk-1013: corrija la posible pérdida de memoria en la sonda y elimínela. Cuando el tipo ACPI es ACPI_SMO8500, data-&gt;dready_trig no se configurará, la memoria asignada por iio_triggered_buffer_setup( ) no se liberará y provocará una pérdida de memoria de la siguiente manera: objeto sin referencia 0xffff888009551400 (tamaño 512): comm "i2c-SMO8500-125", pid 911, jiffies 4294911787 (edad 83,852 s) volcado hexadecimal (primeros 32 bytes): 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 20 e2 e5 c0 ff ff ff ff .... .... ....... retroceso: [&lt;0000000041ce75ee&gt;] kmem_cache_alloc_trace+0x16d/0x360 [&lt;000000000aeb17b0&gt;] iio_kfifo_allocate+0x41/0x130 [kfifo_buf] [&lt;000000004b40c1f5&gt;] ed_buffer_setup_ext+0x2c/0x210 [industrialio_triggered_buffer] [ &lt;000000004375b15f&gt;] kxcjk1013_probe+0x10c3/0x1d81 [kxcjk_1013] Solucionarlo eliminando la condición data-&gt;dready_trig en la sonda y eliminándola.

24 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-24 15:15

Updated : 2025-01-06 20:45


NVD link : CVE-2021-47499

Mitre link : CVE-2021-47499

CVE.ORG link : CVE-2021-47499


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime