In the Linux kernel, the following vulnerability has been resolved: net:
caif: fix memory leak in cfusbl_device_notify In case of caif_enroll_dev()
fail, allocated link_support won’t be assigned to the corresponding
structure. So simply free allocated pointer in case of error.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < 5.4.0-81.91 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1055.58 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws-hwe | < 4.15.0-1110.117~16.04.1 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < 5.4.0-1056.58 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-azure | < 4.15.0-1122.135~14.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-azure | < 4.15.0-1122.135~16.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure-4.15 | < any | UNKNOWN |
git.kernel.org/linus/7f5d86669fa4d485523ddb1d212e0a2d90bd62bb (5.13-rc5)
git.kernel.org/stable/c/46403c1f80b0d3f937ff9c4f5edc63bb64bc5051
git.kernel.org/stable/c/4d94f530cd24c85aede6e72b8923f371b45d6886
git.kernel.org/stable/c/7f5d86669fa4d485523ddb1d212e0a2d90bd62bb
git.kernel.org/stable/c/81afc61cb6e2b553f2c5f992fa79e0ae73857141
git.kernel.org/stable/c/9ea0ab48e755d8f29fe89eb235fb86176fdb597f
git.kernel.org/stable/c/cc302e30a504e6b60a9ac8df7988646f46cd0294
git.kernel.org/stable/c/dde8686985ec24d6b00487080a906609bd613ea1
git.kernel.org/stable/c/e8b37f5009ea7095529790f022859711e6939c76
launchpad.net/bugs/cve/CVE-2021-47121
nvd.nist.gov/vuln/detail/CVE-2021-47121
security-tracker.debian.org/tracker/CVE-2021-47121
www.cve.org/CVERecord?id=CVE-2021-47121