U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

NOTICE UPDATED - May, 29th 2024

The NVD has a new announcement page with status updates, news, and how to stay connected!

CVE-2021-47416 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: phy: mdio: fix memory leak Syzbot reported memory leak in MDIO bus interface, the problem was in wrong state logic. MDIOBUS_ALLOCATED indicates 2 states: 1. Bus is only allocated 2. Bus allocated and __mdiobus_register() fails, but device_register() was called In case of device_register() has been called we should call put_device() to correctly free the memory allocated for this device, but mdiobus_free() calls just kfree(dev) in case of MDIOBUS_ALLOCATED state To avoid this behaviour we need to set bus->state to MDIOBUS_UNREGISTERED _before_ calling device_register(), because put_device() should be called even in case of device_register() failure.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/064c2616234a7394867c924b5c1303974f3a4f4d
https://git.kernel.org/stable/c/0d2dd40a7be61b89a7c99dae8ee96389d27b413a
https://git.kernel.org/stable/c/2250392d930bd0d989f24d355d6355b0150256e7
https://git.kernel.org/stable/c/2397b9e118721292429fea8807a698e71b94795f
https://git.kernel.org/stable/c/25e9f88c7e3cc35f5e3d3db199660d28a15df639
https://git.kernel.org/stable/c/414bb4ead1362ef2c8592db723c017258f213988
https://git.kernel.org/stable/c/ca6e11c337daf7925ff8a2aac8e84490a8691905
https://git.kernel.org/stable/c/f4f502a04ee1e543825af78f47eb7785015cd9f6

Weakness Enumeration

CWE-ID CWE Name Source

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2021-47416
NVD Published Date:
05/21/2024
NVD Last Modified:
05/21/2024
Source:
kernel.org