CVE-2021-47180
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/03/2024
Last modified:
07/01/2025
Description
In the Linux kernel, the following vulnerability has been resolved: NFC: nci: fix memory leak in nci_allocate_device nfcmrvl_disconnect fails to free the hci_dev field in struct nci_dev. Fix this by freeing hci_dev in nci_free_device. BUG: memory leak unreferenced object 0xffff888111ea6800 (size 1024): comm "kworker/1:0", pid 19, jiffies 4294942308 (age 13.580s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 60 fd 0c 81 88 ff ff .........`...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmalloc include/linux/slab.h:552 [inline] [] kzalloc include/linux/slab.h:682 [inline] [] nci_hci_allocate+0x21/0xd0 net/nfc/nci/hci.c:784 [] nci_allocate_device net/nfc/nci/core.c:1170 [inline] [] nci_allocate_device+0x10b/0x160 net/nfc/nci/core.c:1132 [] nfcmrvl_nci_register_dev+0x10a/0x1c0 drivers/nfc/nfcmrvl/main.c:153 [] nfcmrvl_probe+0x223/0x290 drivers/nfc/nfcmrvl/usb.c:345 [] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396 [] really_probe+0x159/0x4a0 drivers/base/dd.c:554 [] driver_probe_device+0x84/0x100 drivers/base/dd.c:740 [] __device_attach_driver+0xee/0x110 drivers/base/dd.c:846 [] bus_for_each_drv+0xb7/0x100 drivers/base/bus.c:431 [] __device_attach+0x122/0x250 drivers/base/dd.c:914 [] bus_probe_device+0xc6/0xe0 drivers/base/bus.c:491 [] device_add+0x5be/0xc30 drivers/base/core.c:3109 [] usb_set_configuration+0x9d9/0xb90 drivers/usb/core/message.c:2164 [] usb_generic_driver_probe+0x8c/0xc0 drivers/usb/core/generic.c:238 [] usb_probe_device+0x5c/0x140 drivers/usb/core/driver.c:293 [] really_probe+0x159/0x4a0 drivers/base/dd.c:554
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.0 (including) | 4.4.271 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.5 (including) | 4.9.271 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 4.14.235 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.193 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.123 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.41 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.12.8 (excluding) |
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0365701bc44e078682ee1224866a71897495c7ef
- https://git.kernel.org/stable/c/2c2fb2df46ea866b49fea5ec7112ec3cd4896c74
- https://git.kernel.org/stable/c/448a1cb12977f52142e6feb12022c59662d88dc1
- https://git.kernel.org/stable/c/4a621621c7af3cec21c47c349b30cd9c3cea11c8
- https://git.kernel.org/stable/c/65234f50a90b64b335cbb9164b8a98c2a0d031dd
- https://git.kernel.org/stable/c/af2a4426baf71163c0c354580ae98c7888a9aba7
- https://git.kernel.org/stable/c/b34cb7ac32cc8e5471dc773180ea9ae676b1a745
- https://git.kernel.org/stable/c/e0652f8bb44d6294eeeac06d703185357f25d50b
- https://git.kernel.org/stable/c/0365701bc44e078682ee1224866a71897495c7ef
- https://git.kernel.org/stable/c/2c2fb2df46ea866b49fea5ec7112ec3cd4896c74
- https://git.kernel.org/stable/c/448a1cb12977f52142e6feb12022c59662d88dc1
- https://git.kernel.org/stable/c/4a621621c7af3cec21c47c349b30cd9c3cea11c8
- https://git.kernel.org/stable/c/65234f50a90b64b335cbb9164b8a98c2a0d031dd
- https://git.kernel.org/stable/c/af2a4426baf71163c0c354580ae98c7888a9aba7
- https://git.kernel.org/stable/c/b34cb7ac32cc8e5471dc773180ea9ae676b1a745
- https://git.kernel.org/stable/c/e0652f8bb44d6294eeeac06d703185357f25d50b