In the Linux kernel, the following vulnerability has been resolved:
regmap: set debugfs_name to NULL after it is freed
There is a upstream commit cffa4b2122f5("regmap:debugfs:
Fix a memory leak when calling regmap_attach_dev") that
adds a if condition when create name for debugfs_name.
With below function invoking logical, debugfs_name is
freed in regmap_debugfs_exit(), but it is not created again
because of the if condition introduced by above commit.
regmap_reinit_cache()
regmap_debugfs_exit()
...
regmap_debugfs_init()
So, set debugfs_name to NULL after it is freed.
Metrics
Affected Vendors & Products
References
History
Mon, 04 Nov 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-02-29T22:37:33.232Z
Updated: 2024-11-04T11:58:37.220Z
Reserved: 2024-02-29T22:33:44.294Z
Link: CVE-2021-47058
Vulnrichment
Updated: 2024-08-04T05:24:39.586Z
NVD
Status : Awaiting Analysis
Published: 2024-02-29T23:15:07.640
Modified: 2024-03-01T14:04:26.010
Link: CVE-2021-47058
Redhat