We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2021-47455

ptp: Fix possible memory leak in ptp_clock_register()



Description

In the Linux kernel, the following vulnerability has been resolved: ptp: Fix possible memory leak in ptp_clock_register() I got memory leak as follows when doing fault injection test: unreferenced object 0xffff88800906c618 (size 8): comm "i2c-idt82p33931", pid 4421, jiffies 4294948083 (age 13.188s) hex dump (first 8 bytes): 70 74 70 30 00 00 00 00 ptp0.... backtrace: [<00000000312ed458>] __kmalloc_track_caller+0x19f/0x3a0 [<0000000079f6e2ff>] kvasprintf+0xb5/0x150 [<0000000026aae54f>] kvasprintf_const+0x60/0x190 [<00000000f323a5f7>] kobject_set_name_vargs+0x56/0x150 [<000000004e35abdd>] dev_set_name+0xc0/0x100 [<00000000f20cfe25>] ptp_clock_register+0x9f4/0xd30 [ptp] [<000000008bb9f0de>] idt82p33_probe.cold+0x8b6/0x1561 [ptp_idt82p33] When posix_clock_register() returns an error, the name allocated in dev_set_name() will be leaked, the put_device() should be used to give up the device reference, then the name will be freed in kobject_cleanup() and other memory will be freed in ptp_clock_release().

Reserved 2024-05-21 | Published 2024-05-22 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

a33121e5487b424339636b25c35d3a180eaa5f5e before 95c0a0c5ec8839f8f21672be786e87a100319ca8
affected

a33121e5487b424339636b25c35d3a180eaa5f5e before 4225fea1cb28370086e17e82c0f69bec2779dca0
affected

5230ef61882d2d14deb846eb6b48370694816e4c
affected

6f5e3bb7879ee1eb71c6c3cbaaffbb0da6cd7d57
affected

89e8fc989feaac00bf1a7f9a766289422e2f5768
affected

2dece4d6d13fe179ee3a5991811712725a56e2f7
affected

0393b8720128d5b39db8523e5bfbfc689f18c37c
affected

bfa2e0cd3dfda64fde43c3dca3aeba298d2fe7ad
affected

Default status
affected

5.5
affected

Any version before 5.5
unaffected

5.14.15
unaffected

5.15
unaffected

References

git.kernel.org/...c/95c0a0c5ec8839f8f21672be786e87a100319ca8

git.kernel.org/...c/4225fea1cb28370086e17e82c0f69bec2779dca0

cve.org (CVE-2021-47455)

nvd.nist.gov (CVE-2021-47455)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2021-47455

Support options

Helpdesk Chat, Email, Knowledgebase