In the Linux kernel, the following vulnerability has been resolved: IB/qib:
Fix memory leak in qib_user_sdma_queue_pkts() The wrong goto label was used
for the error case and missed cleanup of the pkt allocation.
Addresses-Coverity-ID: 1493352 (“Resource leak”)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < 5.4.0-105.119 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1069.73 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < 5.4.0-1073.76 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure-5.4 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-bluefield | < 5.4.0-1032.35 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gcp | < 5.4.0-1068.72 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-gcp-5.4 | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-gke | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gkeop | < 5.4.0-1037.38 | UNKNOWN |
git.kernel.org/linus/bee90911e0138c76ee67458ac0d58b38a3190f65 (5.16-rc7)
git.kernel.org/stable/c/0aaec9c5f60754b56f84460ea439b8c5e91f4caa
git.kernel.org/stable/c/1ced0a3015a95c6a6db45e37250912c4c86697ab
git.kernel.org/stable/c/76b648063eb36c72dfc0a6896de8a0a7d2c7841c
git.kernel.org/stable/c/79dcbd8176152b860028b62f81a635d987365752
git.kernel.org/stable/c/7cf6466e00a77b0a914b7b2c28a1fc7947d55e59
git.kernel.org/stable/c/aefcc25f3a0cd28a87d11d41d30419a12cd26a34
git.kernel.org/stable/c/bee90911e0138c76ee67458ac0d58b38a3190f65
git.kernel.org/stable/c/d53456492b5d02033c73dfa0f3b94c86337791ba
launchpad.net/bugs/cve/CVE-2021-47104
nvd.nist.gov/vuln/detail/CVE-2021-47104
security-tracker.debian.org/tracker/CVE-2021-47104
www.cve.org/CVERecord?id=CVE-2021-47104