CVE-2021-46962
Vulnerability from cvelistv5
Published
2024-02-27 18:47
Modified
2024-12-19 07:32
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: mmc: uniphier-sd: Fix a resource leak in the remove function A 'tmio_mmc_host_free()' call is missing in the remove function, in order to balance a 'tmio_mmc_host_alloc()' call in the probe. This is done in the error handling path of the probe, but not in the remove function. Add the missing call.
Impacted products
Vendor Product Version
Linux Linux Version: 3fd784f745dd1747863775a99ec749619ee6759c
Version: 3fd784f745dd1747863775a99ec749619ee6759c
Version: 3fd784f745dd1747863775a99ec749619ee6759c
Version: 3fd784f745dd1747863775a99ec749619ee6759c
Version: 3fd784f745dd1747863775a99ec749619ee6759c
Create a notification for this product.
   Linux Linux Version: 4.20
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-46962",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-05T20:16:05.784060Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:13:10.391Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:17:42.992Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/0d8941b9b2d3e7b3481fdf43b1a6189d162175b7"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/25ac6ce65f1ab458982d15ec1caf441acd37106a"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/ebe0f12cf4c044f812c6d17011531582f9ac8bb3"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/d6e7fda496978f2763413b5523557b38dc2bf6c2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/e29c84857e2d51aa017ce04284b962742fb97d9e"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/mmc/host/uniphier-sd.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "0d8941b9b2d3e7b3481fdf43b1a6189d162175b7",
              "status": "affected",
              "version": "3fd784f745dd1747863775a99ec749619ee6759c",
              "versionType": "git"
            },
            {
              "lessThan": "25ac6ce65f1ab458982d15ec1caf441acd37106a",
              "status": "affected",
              "version": "3fd784f745dd1747863775a99ec749619ee6759c",
              "versionType": "git"
            },
            {
              "lessThan": "ebe0f12cf4c044f812c6d17011531582f9ac8bb3",
              "status": "affected",
              "version": "3fd784f745dd1747863775a99ec749619ee6759c",
              "versionType": "git"
            },
            {
              "lessThan": "d6e7fda496978f2763413b5523557b38dc2bf6c2",
              "status": "affected",
              "version": "3fd784f745dd1747863775a99ec749619ee6759c",
              "versionType": "git"
            },
            {
              "lessThan": "e29c84857e2d51aa017ce04284b962742fb97d9e",
              "status": "affected",
              "version": "3fd784f745dd1747863775a99ec749619ee6759c",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/mmc/host/uniphier-sd.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "4.20"
            },
            {
              "lessThan": "4.20",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.118",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.36",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.11.*",
              "status": "unaffected",
              "version": "5.11.20",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.12.*",
              "status": "unaffected",
              "version": "5.12.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.13",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: uniphier-sd: Fix a resource leak in the remove function\n\nA \u0027tmio_mmc_host_free()\u0027 call is missing in the remove function, in order\nto balance a \u0027tmio_mmc_host_alloc()\u0027 call in the probe.\nThis is done in the error handling path of the probe, but not in the remove\nfunction.\n\nAdd the missing call."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-19T07:32:37.813Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/0d8941b9b2d3e7b3481fdf43b1a6189d162175b7"
        },
        {
          "url": "https://git.kernel.org/stable/c/25ac6ce65f1ab458982d15ec1caf441acd37106a"
        },
        {
          "url": "https://git.kernel.org/stable/c/ebe0f12cf4c044f812c6d17011531582f9ac8bb3"
        },
        {
          "url": "https://git.kernel.org/stable/c/d6e7fda496978f2763413b5523557b38dc2bf6c2"
        },
        {
          "url": "https://git.kernel.org/stable/c/e29c84857e2d51aa017ce04284b962742fb97d9e"
        }
      ],
      "title": "mmc: uniphier-sd: Fix a resource leak in the remove function",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2021-46962",
    "datePublished": "2024-02-27T18:47:01.169Z",
    "dateReserved": "2024-02-27T18:42:55.942Z",
    "dateUpdated": "2024-12-19T07:32:37.813Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-46962\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-02-27T19:04:06.960\",\"lastModified\":\"2024-12-11T14:56:40.457\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmmc: uniphier-sd: Fix a resource leak in the remove function\\n\\nA \u0027tmio_mmc_host_free()\u0027 call is missing in the remove function, in order\\nto balance a \u0027tmio_mmc_host_alloc()\u0027 call in the probe.\\nThis is done in the error handling path of the probe, but not in the remove\\nfunction.\\n\\nAdd the missing call.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mmc: uniphier-sd: corrige una fuga de recursos en la funci\u00f3n de eliminaci\u00f3n Falta una llamada \u0027tmio_mmc_host_free()\u0027 en la funci\u00f3n de eliminaci\u00f3n, para equilibrar un \u0027tmio_mmc_host_alloc()\u0027 llamar a la sonda. Esto se hace en la ruta de manejo de errores de la sonda, pero no en la funci\u00f3n de eliminaci\u00f3n. Agrega la llamada faltante.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.118\",\"matchCriteriaId\":\"C83F5505-AF9D-4F2A-8D37-A8EB73ED772D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.36\",\"matchCriteriaId\":\"003E22D0-CA29-4338-8B35-0754C740074F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.11.20\",\"matchCriteriaId\":\"EEC03413-9760-46D4-AC1D-EB084A1D4111\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.12\",\"versionEndExcluding\":\"5.12.3\",\"matchCriteriaId\":\"F9D6B2DE-7E4A-4B3B-9AEE-3A2C5F23DA32\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0d8941b9b2d3e7b3481fdf43b1a6189d162175b7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/25ac6ce65f1ab458982d15ec1caf441acd37106a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d6e7fda496978f2763413b5523557b38dc2bf6c2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e29c84857e2d51aa017ce04284b962742fb97d9e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ebe0f12cf4c044f812c6d17011531582f9ac8bb3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/0d8941b9b2d3e7b3481fdf43b1a6189d162175b7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/25ac6ce65f1ab458982d15ec1caf441acd37106a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d6e7fda496978f2763413b5523557b38dc2bf6c2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e29c84857e2d51aa017ce04284b962742fb97d9e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ebe0f12cf4c044f812c6d17011531582f9ac8bb3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/0d8941b9b2d3e7b3481fdf43b1a6189d162175b7\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/25ac6ce65f1ab458982d15ec1caf441acd37106a\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/ebe0f12cf4c044f812c6d17011531582f9ac8bb3\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/d6e7fda496978f2763413b5523557b38dc2bf6c2\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/e29c84857e2d51aa017ce04284b962742fb97d9e\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T05:17:42.992Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-46962\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-03-05T20:16:05.784060Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-23T19:01:15.852Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"title\": \"mmc: uniphier-sd: Fix a resource leak in the remove function\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"3fd784f745dd1747863775a99ec749619ee6759c\", \"lessThan\": \"0d8941b9b2d3e7b3481fdf43b1a6189d162175b7\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3fd784f745dd1747863775a99ec749619ee6759c\", \"lessThan\": \"25ac6ce65f1ab458982d15ec1caf441acd37106a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3fd784f745dd1747863775a99ec749619ee6759c\", \"lessThan\": \"ebe0f12cf4c044f812c6d17011531582f9ac8bb3\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3fd784f745dd1747863775a99ec749619ee6759c\", \"lessThan\": \"d6e7fda496978f2763413b5523557b38dc2bf6c2\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3fd784f745dd1747863775a99ec749619ee6759c\", \"lessThan\": \"e29c84857e2d51aa017ce04284b962742fb97d9e\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/mmc/host/uniphier-sd.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.20\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"4.20\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.4.118\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.36\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.11.20\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.11.*\"}, {\"status\": \"unaffected\", \"version\": \"5.12.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.12.*\"}, {\"status\": \"unaffected\", \"version\": \"5.13\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/mmc/host/uniphier-sd.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/0d8941b9b2d3e7b3481fdf43b1a6189d162175b7\"}, {\"url\": \"https://git.kernel.org/stable/c/25ac6ce65f1ab458982d15ec1caf441acd37106a\"}, {\"url\": \"https://git.kernel.org/stable/c/ebe0f12cf4c044f812c6d17011531582f9ac8bb3\"}, {\"url\": \"https://git.kernel.org/stable/c/d6e7fda496978f2763413b5523557b38dc2bf6c2\"}, {\"url\": \"https://git.kernel.org/stable/c/e29c84857e2d51aa017ce04284b962742fb97d9e\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmmc: uniphier-sd: Fix a resource leak in the remove function\\n\\nA \u0027tmio_mmc_host_free()\u0027 call is missing in the remove function, in order\\nto balance a \u0027tmio_mmc_host_alloc()\u0027 call in the probe.\\nThis is done in the error handling path of the probe, but not in the remove\\nfunction.\\n\\nAdd the missing call.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T07:32:37.813Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2021-46962\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T07:32:37.813Z\", \"dateReserved\": \"2024-02-27T18:42:55.942Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-02-27T18:47:01.169Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.