vulnerability
Ubuntu: (CVE-2021-47180): linux vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Mar 25, 2024 | Nov 19, 2024 | Jun 26, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved:
NFC: nci: fix memory leak in nci_allocate_device
nfcmrvl_disconnect fails to free the hci_dev field in struct nci_dev.
Fix this by freeing hci_dev in nci_free_device.
BUG: memory leak
unreferenced object 0xffff888111ea6800 (size 1024):
comm "kworker/1:0", pid 19, jiffies 4294942308 (age 13.580s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 60 fd 0c 81 88 ff ff .........`......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[] kmalloc include/linux/slab.h:552 [inline]
[] kzalloc include/linux/slab.h:682 [inline]
[] nci_hci_allocate+0x21/0xd0 net/nfc/nci/hci.c:784
[] nci_allocate_device net/nfc/nci/core.c:1170 [inline]
[] nci_allocate_device+0x10b/0x160 net/nfc/nci/core.c:1132
[] nfcmrvl_nci_register_dev+0x10a/0x1c0 drivers/nfc/nfcmrvl/main.c:153
[] nfcmrvl_probe+0x223/0x290 drivers/nfc/nfcmrvl/usb.c:345
[] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396
[] really_probe+0x159/0x4a0 drivers/base/dd.c:554
[] driver_probe_device+0x84/0x100 drivers/base/dd.c:740
[] __device_attach_driver+0xee/0x110 drivers/base/dd.c:846
[] bus_for_each_drv+0xb7/0x100 drivers/base/bus.c:431
[] __device_attach+0x122/0x250 drivers/base/dd.c:914
[] bus_probe_device+0xc6/0xe0 drivers/base/bus.c:491
[] device_add+0x5be/0xc30 drivers/base/core.c:3109
[] usb_set_configuration+0x9d9/0xb90 drivers/usb/core/message.c:2164
[] usb_generic_driver_probe+0x8c/0xc0 drivers/usb/core/generic.c:238
[] usb_probe_device+0x5c/0x140 drivers/usb/core/driver.c:293
[] really_probe+0x159/0x4a0 drivers/base/dd.c:554
Solution(s)
References
- CVE-2021-47180
- https://attackerkb.com/topics/CVE-2021-47180
- URL-https://git.kernel.org/stable/c/0365701bc44e078682ee1224866a71897495c7ef
- URL-https://git.kernel.org/stable/c/2c2fb2df46ea866b49fea5ec7112ec3cd4896c74
- URL-https://git.kernel.org/stable/c/448a1cb12977f52142e6feb12022c59662d88dc1
- URL-https://git.kernel.org/stable/c/4a621621c7af3cec21c47c349b30cd9c3cea11c8
- URL-https://git.kernel.org/stable/c/65234f50a90b64b335cbb9164b8a98c2a0d031dd
- URL-https://git.kernel.org/stable/c/af2a4426baf71163c0c354580ae98c7888a9aba7
- URL-https://git.kernel.org/stable/c/b34cb7ac32cc8e5471dc773180ea9ae676b1a745
- URL-https://git.kernel.org/stable/c/e0652f8bb44d6294eeeac06d703185357f25d50b
- URL-https://www.cve.org/CVERecord?id=CVE-2021-47180

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.