CVE-2024-44971

In the Linux kernel, the following vulnerability has been resolved: net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register() bcm_sf2_mdio_register() calls of_phy_find_device() and then phy_device_remove() in a loop to remove existing PHY devices. of_phy_find_device() eventually calls bus_find_device(), which calls get_device() on the returned struct device * to increment the refcount. The current implementation does not decrement the refcount, which causes memory leak. This commit adds the missing phy_device_free() call to decrement the refcount via put_device() to balance the refcount.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*

History

05 Sep 2024, 17:54

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-401
References () https://git.kernel.org/stable/c/7feef10768ea71d468d9bbc1e0d14c461876768c - () https://git.kernel.org/stable/c/7feef10768ea71d468d9bbc1e0d14c461876768c - Patch
References () https://git.kernel.org/stable/c/a7d2808d67570e6acae45c2a96e0d59986888e4c - () https://git.kernel.org/stable/c/a7d2808d67570e6acae45c2a96e0d59986888e4c - Patch
References () https://git.kernel.org/stable/c/b7b8d9f5e679af60c94251fd6728dde34be69a71 - () https://git.kernel.org/stable/c/b7b8d9f5e679af60c94251fd6728dde34be69a71 - Patch
References () https://git.kernel.org/stable/c/c05516c072903f6fb9134b8e7e1ad4bffcdc4819 - () https://git.kernel.org/stable/c/c05516c072903f6fb9134b8e7e1ad4bffcdc4819 - Patch
References () https://git.kernel.org/stable/c/e3862093ee93fcfbdadcb7957f5f8974fffa806a - () https://git.kernel.org/stable/c/e3862093ee93fcfbdadcb7957f5f8974fffa806a - Patch
References () https://git.kernel.org/stable/c/f3d5efe18a11f94150fee8b3fda9d62079af640a - () https://git.kernel.org/stable/c/f3d5efe18a11f94150fee8b3fda9d62079af640a - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
First Time Linux
Linux linux Kernel

05 Sep 2024, 12:53

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: dsa: bcm_sf2: Se corrige una posible pérdida de memoria en bcm_sf2_mdio_register() bcm_sf2_mdio_register() llama a of_phy_find_device() y luego a phy_device_remove() en un bucle para eliminar los dispositivos PHY existentes. of_phy_find_device() finalmente llama a bus_find_device(), que llama a get_device() en el struct device * devuelto para incrementar el refcount. La implementación actual no disminuye el refcount, lo que causa una pérdida de memoria. Esta confirmación agrega la llamada phy_device_free() faltante para disminuir el refcount a través de put_device() para equilibrar el refcount.

04 Sep 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-04 19:15

Updated : 2024-09-05 17:54


NVD link : CVE-2024-44971

Mitre link : CVE-2024-44971

CVE.ORG link : CVE-2024-44971


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime