CVE-2021-47133
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
15/03/2024
Last modified:
07/01/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
HID: amd_sfh: Fix memory leak in amd_sfh_work<br />
<br />
Kmemleak tool detected a memory leak in the amd_sfh driver.<br />
<br />
====================<br />
unreferenced object 0xffff88810228ada0 (size 32):<br />
comm "insmod", pid 3968, jiffies 4295056001 (age 775.792s)<br />
hex dump (first 32 bytes):<br />
00 20 73 1f 81 88 ff ff 00 01 00 00 00 00 ad de . s.............<br />
22 01 00 00 00 00 ad de 01 00 02 00 00 00 00 00 "...............<br />
backtrace:<br />
[] kmem_cache_alloc_trace+0x163/0x4f0<br />
[] amd_sfh_get_report+0xa4/0x1d0 [amd_sfh]<br />
[] amdtp_hid_request+0x62/0x80 [amd_sfh]<br />
[] sensor_hub_get_feature+0x145/0x270 [hid_sensor_hub]<br />
[] hid_sensor_parse_common_attributes+0x215/0x460 [hid_sensor_iio_common]<br />
[] hid_accel_3d_probe+0xff/0x4a0 [hid_sensor_accel_3d]<br />
[] platform_probe+0x6a/0xd0<br />
[] really_probe+0x192/0x620<br />
[] driver_probe_device+0x14a/0x1d0<br />
[] __device_attach_driver+0xbd/0x110<br />
[] bus_for_each_drv+0xfd/0x160<br />
[] __device_attach+0x18b/0x220<br />
[] device_initial_probe+0x13/0x20<br />
[] bus_probe_device+0xfe/0x120<br />
[] device_add+0x6a6/0xe00<br />
[] platform_device_add+0x180/0x380<br />
====================<br />
<br />
The fix is to freeing request_list entry once the processed entry is<br />
removed from the request_list.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.12.10 (excluding) |
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page