{"id":"CVE-2021-47499","details":"In the Linux kernel, the following vulnerability has been resolved:\n\niio: accel: kxcjk-1013: Fix possible memory leak in probe and remove\n\nWhen ACPI type is ACPI_SMO8500, the data-\u003edready_trig will not be set, the\nmemory allocated by iio_triggered_buffer_setup() will not be freed, and cause\nmemory leak as follows:\n\nunreferenced object 0xffff888009551400 (size 512):\n  comm \"i2c-SMO8500-125\", pid 911, jiffies 4294911787 (age 83.852s)\n  hex dump (first 32 bytes):\n    02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    00 00 00 00 00 00 00 00 20 e2 e5 c0 ff ff ff ff  ........ .......\n  backtrace:\n    [\u003c0000000041ce75ee\u003e] kmem_cache_alloc_trace+0x16d/0x360\n    [\u003c000000000aeb17b0\u003e] iio_kfifo_allocate+0x41/0x130 [kfifo_buf]\n    [\u003c000000004b40c1f5\u003e] iio_triggered_buffer_setup_ext+0x2c/0x210 [industrialio_triggered_buffer]\n    [\u003c000000004375b15f\u003e] kxcjk1013_probe+0x10c3/0x1d81 [kxcjk_1013]\n\nFix it by remove data-\u003edready_trig condition in probe and remove.","modified":"2026-03-15T22:43:14.629125Z","published":"2024-05-24T15:15:09.607Z","related":["SUSE-SU-2024:2008-1","SUSE-SU-2024:2010-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2185-1","SUSE-SU-2024:2189-1","SUSE-SU-2024:2190-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/8c163a14277115ca962103910ab4cce55e862ffb"},{"type":"FIX","url":"https://git.kernel.org/stable/c/8c1d43f3a3fc7184c42d7398bdf59a2a2903e4fc"},{"type":"FIX","url":"https://git.kernel.org/stable/c/a3730f74159ad00a28960c0efe2a931fe6fe6b45"},{"type":"FIX","url":"https://git.kernel.org/stable/c/ee86d0bad80bdcd11a87e188a596727f41b62320"},{"type":"FIX","url":"https://git.kernel.org/stable/c/14508fe13b1c578b3d2ba574f1d48b351975860c"},{"type":"FIX","url":"https://git.kernel.org/stable/c/3899700ddacbf7aaafadf44464fff3ff0d4e3307"},{"type":"FIX","url":"https://git.kernel.org/stable/c/60a55b9d91ba99eb8cf015bc46dc2de05e168a15"},{"type":"FIX","url":"https://git.kernel.org/stable/c/70c9774e180d151abaab358108e3510a8e615215"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47499.json","unresolved_ranges":[{"events":[{"introduced":"4.2"},{"fixed":"4.4.295"}]},{"events":[{"introduced":"4.5"},{"fixed":"4.9.293"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.14.258"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.221"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.165"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.85"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.15.8"}]},{"events":[{"introduced":"0"},{"last_affected":"5.16-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.16-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.16-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"5.16-rc4"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}