THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Zendesk (Helpdesk and Chat)

Ok

PUBLISHED

CVE-2021-47455

ptp: Fix possible memory leak in ptp_clock_register()

Assigner:Linux (416baaa9-dc9f-4396-8d5f-8c081fb06d67)
Reserved:2024-05-21
Published:2024-05-22
Updated:2024-06-10

Description

In the Linux kernel, the following vulnerability has been resolved: ptp: Fix possible memory leak in ptp_clock_register() I got memory leak as follows when doing fault injection test: unreferenced object 0xffff88800906c618 (size 8): comm "i2c-idt82p33931", pid 4421, jiffies 4294948083 (age 13.188s) hex dump (first 8 bytes): 70 74 70 30 00 00 00 00 ptp0.... backtrace: [<00000000312ed458>] __kmalloc_track_caller+0x19f/0x3a0 [<0000000079f6e2ff>] kvasprintf+0xb5/0x150 [<0000000026aae54f>] kvasprintf_const+0x60/0x190 [<00000000f323a5f7>] kobject_set_name_vargs+0x56/0x150 [<000000004e35abdd>] dev_set_name+0xc0/0x100 [<00000000f20cfe25>] ptp_clock_register+0x9f4/0xd30 [ptp] [<000000008bb9f0de>] idt82p33_probe.cold+0x8b6/0x1561 [ptp_idt82p33] When posix_clock_register() returns an error, the name allocated in dev_set_name() will be leaked, the put_device() should be used to give up the device reference, then the name will be freed in kobject_cleanup() and other memory will be freed in ptp_clock_release().

Product status

Default status
unaffected

a33121e5487b before 95c0a0c5ec88
affected

a33121e5487b before 4225fea1cb28
affected

Default status
affected

5.5
affected

Any version before 5.5
unaffected

5.14.15
unaffected

5.15
unaffected

References

https://git.kernel.org/stable/c/95c0a0c5ec8839f8f21672be786e87a100319ca8

https://git.kernel.org/stable/c/4225fea1cb28370086e17e82c0f69bec2779dca0

cve.org CVE-2021-47455

nvd.nist.gov CVE-2021-47455

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2021-47455