CVE-2021-47455
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
22/05/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ptp: Fix possible memory leak in ptp_clock_register()<br />
<br />
I got memory leak as follows when doing fault injection test:<br />
<br />
unreferenced object 0xffff88800906c618 (size 8):<br />
comm "i2c-idt82p33931", pid 4421, jiffies 4294948083 (age 13.188s)<br />
hex dump (first 8 bytes):<br />
70 74 70 30 00 00 00 00 ptp0....<br />
backtrace:<br />
[] __kmalloc_track_caller+0x19f/0x3a0<br />
[] kvasprintf+0xb5/0x150<br />
[] kvasprintf_const+0x60/0x190<br />
[] kobject_set_name_vargs+0x56/0x150<br />
[] dev_set_name+0xc0/0x100<br />
[] ptp_clock_register+0x9f4/0xd30 [ptp]<br />
[] idt82p33_probe.cold+0x8b6/0x1561 [ptp_idt82p33]<br />
<br />
When posix_clock_register() returns an error, the name allocated<br />
in dev_set_name() will be leaked, the put_device() should be used<br />
to give up the device reference, then the name will be freed in<br />
kobject_cleanup() and other memory will be freed in ptp_clock_release().
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.16.83 (including) | 3.17 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.4.224 (including) | 4.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.9.224 (including) | 4.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.14.162 (including) | 4.15 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19.93 (including) | 4.20 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4.8 (including) | 5.14.15 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/4225fea1cb28370086e17e82c0f69bec2779dca0
- https://git.kernel.org/stable/c/95c0a0c5ec8839f8f21672be786e87a100319ca8
- https://git.kernel.org/stable/c/f1c96d8085588e1b997a96214b409ac3be20b524
- https://git.kernel.org/stable/c/4225fea1cb28370086e17e82c0f69bec2779dca0
- https://git.kernel.org/stable/c/95c0a0c5ec8839f8f21672be786e87a100319ca8
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html



