CVE-2021-46985
Linux Kernel ACPI Memory Leak Vulnerability
Description
In the Linux kernel, the following vulnerability has been resolved: ACPI: scan: Fix a memory leak in an error handling path If 'acpi_device_set_name()' fails, we must free 'acpi_device_bus_id->bus_id' or there is a (potential) memory leak.
INFO
Published Date :
Feb. 28, 2024, 9:15 a.m.
Last Modified :
Dec. 6, 2024, 3:02 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSS Scores
Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|---|
CVSS 3.1 | MEDIUM | [email protected] |
Solution
- Update the Linux kernel.
- Reboot the system.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2021-46985
.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2021-46985
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2021-46985
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2021-46985
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2021-46985
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Dec. 06, 2024
Action Type Old Value New Value Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Added CWE NIST CWE-401 Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.9.264 up to (excluding) 4.9.269 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.14.228 up to (excluding) 4.14.233 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.19.184 up to (excluding) 4.19.191 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.4.109 up to (excluding) 5.4.120 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.10.27 up to (excluding) 5.10.38 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11.11 up to (excluding) 5.11.22 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.12 up to (excluding) 5.12.5 *cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* Changed Reference Type https://git.kernel.org/stable/c/0c8bd174f0fc131bc9dfab35cd8784f59045da87 No Types Assigned https://git.kernel.org/stable/c/0c8bd174f0fc131bc9dfab35cd8784f59045da87 Patch Changed Reference Type https://git.kernel.org/stable/c/0c8bd174f0fc131bc9dfab35cd8784f59045da87 No Types Assigned https://git.kernel.org/stable/c/0c8bd174f0fc131bc9dfab35cd8784f59045da87 Patch Changed Reference Type https://git.kernel.org/stable/c/5ab9857dde7c3ea3faef6b128d718cf8ba98721b No Types Assigned https://git.kernel.org/stable/c/5ab9857dde7c3ea3faef6b128d718cf8ba98721b Patch Changed Reference Type https://git.kernel.org/stable/c/5ab9857dde7c3ea3faef6b128d718cf8ba98721b No Types Assigned https://git.kernel.org/stable/c/5ab9857dde7c3ea3faef6b128d718cf8ba98721b Patch Changed Reference Type https://git.kernel.org/stable/c/6901a4f795e0e8d65ae779cb37fc22e0bf294712 No Types Assigned https://git.kernel.org/stable/c/6901a4f795e0e8d65ae779cb37fc22e0bf294712 Patch Changed Reference Type https://git.kernel.org/stable/c/6901a4f795e0e8d65ae779cb37fc22e0bf294712 No Types Assigned https://git.kernel.org/stable/c/6901a4f795e0e8d65ae779cb37fc22e0bf294712 Patch Changed Reference Type https://git.kernel.org/stable/c/69cc821e89ce572884548ac54c4f80eec7a837a5 No Types Assigned https://git.kernel.org/stable/c/69cc821e89ce572884548ac54c4f80eec7a837a5 Patch Changed Reference Type https://git.kernel.org/stable/c/69cc821e89ce572884548ac54c4f80eec7a837a5 No Types Assigned https://git.kernel.org/stable/c/69cc821e89ce572884548ac54c4f80eec7a837a5 Patch Changed Reference Type https://git.kernel.org/stable/c/a7e17a8d421ae23c920240625b4413c7b94d94a4 No Types Assigned https://git.kernel.org/stable/c/a7e17a8d421ae23c920240625b4413c7b94d94a4 Patch Changed Reference Type https://git.kernel.org/stable/c/a7e17a8d421ae23c920240625b4413c7b94d94a4 No Types Assigned https://git.kernel.org/stable/c/a7e17a8d421ae23c920240625b4413c7b94d94a4 Patch Changed Reference Type https://git.kernel.org/stable/c/c5c8f6ffc942cf42f990f22e35bcf4cbe9d8c2fb No Types Assigned https://git.kernel.org/stable/c/c5c8f6ffc942cf42f990f22e35bcf4cbe9d8c2fb Patch Changed Reference Type https://git.kernel.org/stable/c/c5c8f6ffc942cf42f990f22e35bcf4cbe9d8c2fb No Types Assigned https://git.kernel.org/stable/c/c5c8f6ffc942cf42f990f22e35bcf4cbe9d8c2fb Patch Changed Reference Type https://git.kernel.org/stable/c/dafd4c0b5e835db020cff11c74b4af9493a58e72 No Types Assigned https://git.kernel.org/stable/c/dafd4c0b5e835db020cff11c74b4af9493a58e72 Patch Changed Reference Type https://git.kernel.org/stable/c/dafd4c0b5e835db020cff11c74b4af9493a58e72 No Types Assigned https://git.kernel.org/stable/c/dafd4c0b5e835db020cff11c74b4af9493a58e72 Patch Changed Reference Type https://git.kernel.org/stable/c/e2381174daeae0ca35eddffef02dcc8de8c1ef8a No Types Assigned https://git.kernel.org/stable/c/e2381174daeae0ca35eddffef02dcc8de8c1ef8a Patch Changed Reference Type https://git.kernel.org/stable/c/e2381174daeae0ca35eddffef02dcc8de8c1ef8a No Types Assigned https://git.kernel.org/stable/c/e2381174daeae0ca35eddffef02dcc8de8c1ef8a Patch -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 21, 2024
Action Type Old Value New Value Added Reference https://git.kernel.org/stable/c/0c8bd174f0fc131bc9dfab35cd8784f59045da87 Added Reference https://git.kernel.org/stable/c/5ab9857dde7c3ea3faef6b128d718cf8ba98721b Added Reference https://git.kernel.org/stable/c/6901a4f795e0e8d65ae779cb37fc22e0bf294712 Added Reference https://git.kernel.org/stable/c/69cc821e89ce572884548ac54c4f80eec7a837a5 Added Reference https://git.kernel.org/stable/c/a7e17a8d421ae23c920240625b4413c7b94d94a4 Added Reference https://git.kernel.org/stable/c/c5c8f6ffc942cf42f990f22e35bcf4cbe9d8c2fb Added Reference https://git.kernel.org/stable/c/dafd4c0b5e835db020cff11c74b4af9493a58e72 Added Reference https://git.kernel.org/stable/c/e2381174daeae0ca35eddffef02dcc8de8c1ef8a -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 28, 2024
Action Type Old Value New Value -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 14, 2024
Action Type Old Value New Value -
CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Feb. 28, 2024
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: ACPI: scan: Fix a memory leak in an error handling path If 'acpi_device_set_name()' fails, we must free 'acpi_device_bus_id->bus_id' or there is a (potential) memory leak. Added Reference Linux https://git.kernel.org/stable/c/6901a4f795e0e8d65ae779cb37fc22e0bf294712 [No types assigned] Added Reference Linux https://git.kernel.org/stable/c/5ab9857dde7c3ea3faef6b128d718cf8ba98721b [No types assigned] Added Reference Linux https://git.kernel.org/stable/c/69cc821e89ce572884548ac54c4f80eec7a837a5 [No types assigned] Added Reference Linux https://git.kernel.org/stable/c/dafd4c0b5e835db020cff11c74b4af9493a58e72 [No types assigned] Added Reference Linux https://git.kernel.org/stable/c/e2381174daeae0ca35eddffef02dcc8de8c1ef8a [No types assigned] Added Reference Linux https://git.kernel.org/stable/c/c5c8f6ffc942cf42f990f22e35bcf4cbe9d8c2fb [No types assigned] Added Reference Linux https://git.kernel.org/stable/c/a7e17a8d421ae23c920240625b4413c7b94d94a4 [No types assigned] Added Reference Linux https://git.kernel.org/stable/c/0c8bd174f0fc131bc9dfab35cd8784f59045da87 [No types assigned]