5.5
MEDIUM CVSS 3.1
CVE-2021-46985
Linux Kernel ACPI Memory Leak Vulnerability
Description

In the Linux kernel, the following vulnerability has been resolved: ACPI: scan: Fix a memory leak in an error handling path If 'acpi_device_set_name()' fails, we must free 'acpi_device_bus_id->bus_id' or there is a (potential) memory leak.

INFO

Published Date :

Feb. 28, 2024, 9:15 a.m.

Last Modified :

Dec. 6, 2024, 3:02 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2021-46985 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 MEDIUM [email protected]
Solution
Update the Linux kernel to address a memory leak vulnerability.
  • Update the Linux kernel.
  • Reboot the system.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2021-46985 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2021-46985 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2021-46985 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2021-46985 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Dec. 06, 2024

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
    Added CWE NIST CWE-401
    Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.9.264 up to (excluding) 4.9.269 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.14.228 up to (excluding) 4.14.233 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.19.184 up to (excluding) 4.19.191 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.4.109 up to (excluding) 5.4.120 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.10.27 up to (excluding) 5.10.38 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11.11 up to (excluding) 5.11.22 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.12 up to (excluding) 5.12.5 *cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
    Changed Reference Type https://git.kernel.org/stable/c/0c8bd174f0fc131bc9dfab35cd8784f59045da87 No Types Assigned https://git.kernel.org/stable/c/0c8bd174f0fc131bc9dfab35cd8784f59045da87 Patch
    Changed Reference Type https://git.kernel.org/stable/c/0c8bd174f0fc131bc9dfab35cd8784f59045da87 No Types Assigned https://git.kernel.org/stable/c/0c8bd174f0fc131bc9dfab35cd8784f59045da87 Patch
    Changed Reference Type https://git.kernel.org/stable/c/5ab9857dde7c3ea3faef6b128d718cf8ba98721b No Types Assigned https://git.kernel.org/stable/c/5ab9857dde7c3ea3faef6b128d718cf8ba98721b Patch
    Changed Reference Type https://git.kernel.org/stable/c/5ab9857dde7c3ea3faef6b128d718cf8ba98721b No Types Assigned https://git.kernel.org/stable/c/5ab9857dde7c3ea3faef6b128d718cf8ba98721b Patch
    Changed Reference Type https://git.kernel.org/stable/c/6901a4f795e0e8d65ae779cb37fc22e0bf294712 No Types Assigned https://git.kernel.org/stable/c/6901a4f795e0e8d65ae779cb37fc22e0bf294712 Patch
    Changed Reference Type https://git.kernel.org/stable/c/6901a4f795e0e8d65ae779cb37fc22e0bf294712 No Types Assigned https://git.kernel.org/stable/c/6901a4f795e0e8d65ae779cb37fc22e0bf294712 Patch
    Changed Reference Type https://git.kernel.org/stable/c/69cc821e89ce572884548ac54c4f80eec7a837a5 No Types Assigned https://git.kernel.org/stable/c/69cc821e89ce572884548ac54c4f80eec7a837a5 Patch
    Changed Reference Type https://git.kernel.org/stable/c/69cc821e89ce572884548ac54c4f80eec7a837a5 No Types Assigned https://git.kernel.org/stable/c/69cc821e89ce572884548ac54c4f80eec7a837a5 Patch
    Changed Reference Type https://git.kernel.org/stable/c/a7e17a8d421ae23c920240625b4413c7b94d94a4 No Types Assigned https://git.kernel.org/stable/c/a7e17a8d421ae23c920240625b4413c7b94d94a4 Patch
    Changed Reference Type https://git.kernel.org/stable/c/a7e17a8d421ae23c920240625b4413c7b94d94a4 No Types Assigned https://git.kernel.org/stable/c/a7e17a8d421ae23c920240625b4413c7b94d94a4 Patch
    Changed Reference Type https://git.kernel.org/stable/c/c5c8f6ffc942cf42f990f22e35bcf4cbe9d8c2fb No Types Assigned https://git.kernel.org/stable/c/c5c8f6ffc942cf42f990f22e35bcf4cbe9d8c2fb Patch
    Changed Reference Type https://git.kernel.org/stable/c/c5c8f6ffc942cf42f990f22e35bcf4cbe9d8c2fb No Types Assigned https://git.kernel.org/stable/c/c5c8f6ffc942cf42f990f22e35bcf4cbe9d8c2fb Patch
    Changed Reference Type https://git.kernel.org/stable/c/dafd4c0b5e835db020cff11c74b4af9493a58e72 No Types Assigned https://git.kernel.org/stable/c/dafd4c0b5e835db020cff11c74b4af9493a58e72 Patch
    Changed Reference Type https://git.kernel.org/stable/c/dafd4c0b5e835db020cff11c74b4af9493a58e72 No Types Assigned https://git.kernel.org/stable/c/dafd4c0b5e835db020cff11c74b4af9493a58e72 Patch
    Changed Reference Type https://git.kernel.org/stable/c/e2381174daeae0ca35eddffef02dcc8de8c1ef8a No Types Assigned https://git.kernel.org/stable/c/e2381174daeae0ca35eddffef02dcc8de8c1ef8a Patch
    Changed Reference Type https://git.kernel.org/stable/c/e2381174daeae0ca35eddffef02dcc8de8c1ef8a No Types Assigned https://git.kernel.org/stable/c/e2381174daeae0ca35eddffef02dcc8de8c1ef8a Patch
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://git.kernel.org/stable/c/0c8bd174f0fc131bc9dfab35cd8784f59045da87
    Added Reference https://git.kernel.org/stable/c/5ab9857dde7c3ea3faef6b128d718cf8ba98721b
    Added Reference https://git.kernel.org/stable/c/6901a4f795e0e8d65ae779cb37fc22e0bf294712
    Added Reference https://git.kernel.org/stable/c/69cc821e89ce572884548ac54c4f80eec7a837a5
    Added Reference https://git.kernel.org/stable/c/a7e17a8d421ae23c920240625b4413c7b94d94a4
    Added Reference https://git.kernel.org/stable/c/c5c8f6ffc942cf42f990f22e35bcf4cbe9d8c2fb
    Added Reference https://git.kernel.org/stable/c/dafd4c0b5e835db020cff11c74b4af9493a58e72
    Added Reference https://git.kernel.org/stable/c/e2381174daeae0ca35eddffef02dcc8de8c1ef8a
  • CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    May. 28, 2024

    Action Type Old Value New Value
  • CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Feb. 28, 2024

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: ACPI: scan: Fix a memory leak in an error handling path If 'acpi_device_set_name()' fails, we must free 'acpi_device_bus_id->bus_id' or there is a (potential) memory leak.
    Added Reference Linux https://git.kernel.org/stable/c/6901a4f795e0e8d65ae779cb37fc22e0bf294712 [No types assigned]
    Added Reference Linux https://git.kernel.org/stable/c/5ab9857dde7c3ea3faef6b128d718cf8ba98721b [No types assigned]
    Added Reference Linux https://git.kernel.org/stable/c/69cc821e89ce572884548ac54c4f80eec7a837a5 [No types assigned]
    Added Reference Linux https://git.kernel.org/stable/c/dafd4c0b5e835db020cff11c74b4af9493a58e72 [No types assigned]
    Added Reference Linux https://git.kernel.org/stable/c/e2381174daeae0ca35eddffef02dcc8de8c1ef8a [No types assigned]
    Added Reference Linux https://git.kernel.org/stable/c/c5c8f6ffc942cf42f990f22e35bcf4cbe9d8c2fb [No types assigned]
    Added Reference Linux https://git.kernel.org/stable/c/a7e17a8d421ae23c920240625b4413c7b94d94a4 [No types assigned]
    Added Reference Linux https://git.kernel.org/stable/c/0c8bd174f0fc131bc9dfab35cd8784f59045da87 [No types assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 5.5
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact