In the Linux kernel, the following vulnerability has been resolved: net:
caif: fix memory leak in caif_device_notify In case of caif_enroll_dev()
fail, allocated link_support won’t be assigned to the corresponding
structure. So simply free allocated pointer in case of error
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws-hwe | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure-4.15 | < any | UNKNOWN |
git.kernel.org/linus/b53558a950a89824938e9811eddfc8efcd94e1bb (5.13-rc5)
git.kernel.org/stable/c/3be863c11cab725add9fef4237ed4e232c3fc3bb
git.kernel.org/stable/c/4bca2034b41c15b62d47a19158bb76235fd4455d
git.kernel.org/stable/c/6a0e317f61094d377335547e015dd2ff12caf893
git.kernel.org/stable/c/9348c1f10932f13b299cbc8b1bd5f780751fae49
git.kernel.org/stable/c/af2806345a37313f01b1c9f15e046745b8ee2daa
git.kernel.org/stable/c/b042e2b2039565eb8f0eb51c14fbe1ef463c8cd8
git.kernel.org/stable/c/b53558a950a89824938e9811eddfc8efcd94e1bb
git.kernel.org/stable/c/f52f4fd67264c70cd0b4ba326962ebe12d9cba94
launchpad.net/bugs/cve/CVE-2021-47122
nvd.nist.gov/vuln/detail/CVE-2021-47122
security-tracker.debian.org/tracker/CVE-2021-47122
www.cve.org/CVERecord?id=CVE-2021-47122