We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2021-47455

ptp: Fix possible memory leak in ptp_clock_register()



Description

In the Linux kernel, the following vulnerability has been resolved: ptp: Fix possible memory leak in ptp_clock_register() I got memory leak as follows when doing fault injection test: unreferenced object 0xffff88800906c618 (size 8): comm "i2c-idt82p33931", pid 4421, jiffies 4294948083 (age 13.188s) hex dump (first 8 bytes): 70 74 70 30 00 00 00 00 ptp0.... backtrace: [<00000000312ed458>] __kmalloc_track_caller+0x19f/0x3a0 [<0000000079f6e2ff>] kvasprintf+0xb5/0x150 [<0000000026aae54f>] kvasprintf_const+0x60/0x190 [<00000000f323a5f7>] kobject_set_name_vargs+0x56/0x150 [<000000004e35abdd>] dev_set_name+0xc0/0x100 [<00000000f20cfe25>] ptp_clock_register+0x9f4/0xd30 [ptp] [<000000008bb9f0de>] idt82p33_probe.cold+0x8b6/0x1561 [ptp_idt82p33] When posix_clock_register() returns an error, the name allocated in dev_set_name() will be leaked, the put_device() should be used to give up the device reference, then the name will be freed in kobject_cleanup() and other memory will be freed in ptp_clock_release().

Reserved 2024-05-21 | Published 2024-05-22 | Updated 2024-12-19 | Assigner Linux

Product status

Default status
unaffected

a33121e5487b424339636b25c35d3a180eaa5f5e before 95c0a0c5ec8839f8f21672be786e87a100319ca8
affected

a33121e5487b424339636b25c35d3a180eaa5f5e before 4225fea1cb28370086e17e82c0f69bec2779dca0
affected

Default status
affected

5.5
affected

Any version before 5.5
unaffected

5.14.15
unaffected

5.15
unaffected

References

git.kernel.org/...c/95c0a0c5ec8839f8f21672be786e87a100319ca8

git.kernel.org/...c/4225fea1cb28370086e17e82c0f69bec2779dca0

cve.org (CVE-2021-47455)

nvd.nist.gov (CVE-2021-47455)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2021-47455

Support options

Helpdesk Chat, Email, Knowledgebase