CVE-2021-47258

In the Linux kernel, the following vulnerability has been resolved: scsi: core: Fix error handling of scsi_host_alloc() After device is initialized via device_initialize(), or its name is set via dev_set_name(), the device has to be freed via put_device(). Otherwise device name will be leaked because it is allocated dynamically in dev_set_name(). Fix the leak by replacing kfree() with put_device(). Since scsi_host_dev_release() properly handles IDA and kthread removal, remove special-casing these from the error handling as well.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*

History

30 Apr 2025, 15:05

Type Values Removed Values Added
CWE CWE-401
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/2dc85045ae65b9302a1d2e2ddd7ce4c030153a6a - () https://git.kernel.org/stable/c/2dc85045ae65b9302a1d2e2ddd7ce4c030153a6a - Patch
References () https://git.kernel.org/stable/c/45d83db4728127944b237c0c8248987df9d478e7 - () https://git.kernel.org/stable/c/45d83db4728127944b237c0c8248987df9d478e7 - Patch
References () https://git.kernel.org/stable/c/66a834d092930cf41d809c0e989b13cd6f9ca006 - () https://git.kernel.org/stable/c/66a834d092930cf41d809c0e989b13cd6f9ca006 - Patch
References () https://git.kernel.org/stable/c/79296e292d67fa7b5fb8d8c27343683e823872c8 - () https://git.kernel.org/stable/c/79296e292d67fa7b5fb8d8c27343683e823872c8 - Patch
References () https://git.kernel.org/stable/c/7a696ce1d5d16a33a6cd6400bbcc0339b2460e11 - () https://git.kernel.org/stable/c/7a696ce1d5d16a33a6cd6400bbcc0339b2460e11 - Patch
References () https://git.kernel.org/stable/c/8958181c1663e24a13434448e7d6b96b5d04900a - () https://git.kernel.org/stable/c/8958181c1663e24a13434448e7d6b96b5d04900a - Patch
References () https://git.kernel.org/stable/c/db08ce595dd64ea9859f7d088b51cbfc8e685c66 - () https://git.kernel.org/stable/c/db08ce595dd64ea9859f7d088b51cbfc8e685c66 - Patch
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Information

Published : 2024-05-21 15:15

Updated : 2025-04-30 15:05


NVD link : CVE-2021-47258

Mitre link : CVE-2021-47258

CVE.ORG link : CVE-2021-47258


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime