CVE-2021-47499
"ASUS iio Accelerator KXCJK-1013 Memory Leak"
Description
In the Linux kernel, the following vulnerability has been resolved: iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove When ACPI type is ACPI_SMO8500, the data->dready_trig will not be set, the memory allocated by iio_triggered_buffer_setup() will not be freed, and cause memory leak as follows: unreferenced object 0xffff888009551400 (size 512): comm "i2c-SMO8500-125", pid 911, jiffies 4294911787 (age 83.852s) hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 20 e2 e5 c0 ff ff ff ff ........ ....... backtrace: [<0000000041ce75ee>] kmem_cache_alloc_trace+0x16d/0x360 [<000000000aeb17b0>] iio_kfifo_allocate+0x41/0x130 [kfifo_buf] [<000000004b40c1f5>] iio_triggered_buffer_setup_ext+0x2c/0x210 [industrialio_triggered_buffer] [<000000004375b15f>] kxcjk1013_probe+0x10c3/0x1d81 [kxcjk_1013] Fix it by remove data->dready_trig condition in probe and remove.
INFO
Published Date :
May 24, 2024, 3:15 p.m.
Last Modified :
Jan. 6, 2025, 8:45 p.m.
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Remotely Exploitable :
No
Impact Score :
3.6
Exploitability Score :
1.8
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2021-47499
.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2021-47499
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2021-47499
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Jan. 06, 2025
Action Type Old Value New Value Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Added CWE NIST CWE-401 Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.2 up to (excluding) 4.4.295 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.5 up to (excluding) 4.9.293 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.10 up to (excluding) 4.14.258 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.15 up to (excluding) 4.19.221 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 up to (excluding) 5.4.165 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.85 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.8 *cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:* Changed Reference Type https://git.kernel.org/stable/c/14508fe13b1c578b3d2ba574f1d48b351975860c No Types Assigned https://git.kernel.org/stable/c/14508fe13b1c578b3d2ba574f1d48b351975860c Patch Changed Reference Type https://git.kernel.org/stable/c/14508fe13b1c578b3d2ba574f1d48b351975860c No Types Assigned https://git.kernel.org/stable/c/14508fe13b1c578b3d2ba574f1d48b351975860c Patch Changed Reference Type https://git.kernel.org/stable/c/3899700ddacbf7aaafadf44464fff3ff0d4e3307 No Types Assigned https://git.kernel.org/stable/c/3899700ddacbf7aaafadf44464fff3ff0d4e3307 Patch Changed Reference Type https://git.kernel.org/stable/c/3899700ddacbf7aaafadf44464fff3ff0d4e3307 No Types Assigned https://git.kernel.org/stable/c/3899700ddacbf7aaafadf44464fff3ff0d4e3307 Patch Changed Reference Type https://git.kernel.org/stable/c/60a55b9d91ba99eb8cf015bc46dc2de05e168a15 No Types Assigned https://git.kernel.org/stable/c/60a55b9d91ba99eb8cf015bc46dc2de05e168a15 Patch Changed Reference Type https://git.kernel.org/stable/c/60a55b9d91ba99eb8cf015bc46dc2de05e168a15 No Types Assigned https://git.kernel.org/stable/c/60a55b9d91ba99eb8cf015bc46dc2de05e168a15 Patch Changed Reference Type https://git.kernel.org/stable/c/70c9774e180d151abaab358108e3510a8e615215 No Types Assigned https://git.kernel.org/stable/c/70c9774e180d151abaab358108e3510a8e615215 Patch Changed Reference Type https://git.kernel.org/stable/c/70c9774e180d151abaab358108e3510a8e615215 No Types Assigned https://git.kernel.org/stable/c/70c9774e180d151abaab358108e3510a8e615215 Patch Changed Reference Type https://git.kernel.org/stable/c/8c163a14277115ca962103910ab4cce55e862ffb No Types Assigned https://git.kernel.org/stable/c/8c163a14277115ca962103910ab4cce55e862ffb Patch Changed Reference Type https://git.kernel.org/stable/c/8c163a14277115ca962103910ab4cce55e862ffb No Types Assigned https://git.kernel.org/stable/c/8c163a14277115ca962103910ab4cce55e862ffb Patch Changed Reference Type https://git.kernel.org/stable/c/8c1d43f3a3fc7184c42d7398bdf59a2a2903e4fc No Types Assigned https://git.kernel.org/stable/c/8c1d43f3a3fc7184c42d7398bdf59a2a2903e4fc Patch Changed Reference Type https://git.kernel.org/stable/c/8c1d43f3a3fc7184c42d7398bdf59a2a2903e4fc No Types Assigned https://git.kernel.org/stable/c/8c1d43f3a3fc7184c42d7398bdf59a2a2903e4fc Patch Changed Reference Type https://git.kernel.org/stable/c/a3730f74159ad00a28960c0efe2a931fe6fe6b45 No Types Assigned https://git.kernel.org/stable/c/a3730f74159ad00a28960c0efe2a931fe6fe6b45 Patch Changed Reference Type https://git.kernel.org/stable/c/a3730f74159ad00a28960c0efe2a931fe6fe6b45 No Types Assigned https://git.kernel.org/stable/c/a3730f74159ad00a28960c0efe2a931fe6fe6b45 Patch Changed Reference Type https://git.kernel.org/stable/c/ee86d0bad80bdcd11a87e188a596727f41b62320 No Types Assigned https://git.kernel.org/stable/c/ee86d0bad80bdcd11a87e188a596727f41b62320 Patch Changed Reference Type https://git.kernel.org/stable/c/ee86d0bad80bdcd11a87e188a596727f41b62320 No Types Assigned https://git.kernel.org/stable/c/ee86d0bad80bdcd11a87e188a596727f41b62320 Patch -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 21, 2024
Action Type Old Value New Value Added Reference https://git.kernel.org/stable/c/14508fe13b1c578b3d2ba574f1d48b351975860c Added Reference https://git.kernel.org/stable/c/3899700ddacbf7aaafadf44464fff3ff0d4e3307 Added Reference https://git.kernel.org/stable/c/60a55b9d91ba99eb8cf015bc46dc2de05e168a15 Added Reference https://git.kernel.org/stable/c/70c9774e180d151abaab358108e3510a8e615215 Added Reference https://git.kernel.org/stable/c/8c163a14277115ca962103910ab4cce55e862ffb Added Reference https://git.kernel.org/stable/c/8c1d43f3a3fc7184c42d7398bdf59a2a2903e4fc Added Reference https://git.kernel.org/stable/c/a3730f74159ad00a28960c0efe2a931fe6fe6b45 Added Reference https://git.kernel.org/stable/c/ee86d0bad80bdcd11a87e188a596727f41b62320 -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 28, 2024
Action Type Old Value New Value -
CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 24, 2024
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove When ACPI type is ACPI_SMO8500, the data->dready_trig will not be set, the memory allocated by iio_triggered_buffer_setup() will not be freed, and cause memory leak as follows: unreferenced object 0xffff888009551400 (size 512): comm "i2c-SMO8500-125", pid 911, jiffies 4294911787 (age 83.852s) hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 20 e2 e5 c0 ff ff ff ff ........ ....... backtrace: [<0000000041ce75ee>] kmem_cache_alloc_trace+0x16d/0x360 [<000000000aeb17b0>] iio_kfifo_allocate+0x41/0x130 [kfifo_buf] [<000000004b40c1f5>] iio_triggered_buffer_setup_ext+0x2c/0x210 [industrialio_triggered_buffer] [<000000004375b15f>] kxcjk1013_probe+0x10c3/0x1d81 [kxcjk_1013] Fix it by remove data->dready_trig condition in probe and remove. Added Reference kernel.org https://git.kernel.org/stable/c/8c1d43f3a3fc7184c42d7398bdf59a2a2903e4fc [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/60a55b9d91ba99eb8cf015bc46dc2de05e168a15 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/3899700ddacbf7aaafadf44464fff3ff0d4e3307 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/a3730f74159ad00a28960c0efe2a931fe6fe6b45 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/8c163a14277115ca962103910ab4cce55e862ffb [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/ee86d0bad80bdcd11a87e188a596727f41b62320 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/14508fe13b1c578b3d2ba574f1d48b351975860c [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/70c9774e180d151abaab358108e3510a8e615215 [No types assigned]
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2021-47499
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2021-47499
weaknesses.