In the Linux kernel, the following vulnerability has been resolved: net:
dsa: sja1105: add error handling in sja1105_setup() If any of
sja1105_static_config_load(), sja1105_clocking_setup() or
sja1105_devlink_setup() fails, we can’t just return in the middle of
sja1105_setup() or memory will leak. Add a cleanup path.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-bluefield | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gcp | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gkeop | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-ibm | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-iot | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-kvm | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-oracle | < any | UNKNOWN |
git.kernel.org/stable/c/987e4ab8b8a4fcbf783069e03e7524cd39ffd563
git.kernel.org/stable/c/cec279a898a3b004411682f212215ccaea1cd0fb
git.kernel.org/stable/c/dd8609f203448ca6d58ae71461208b3f6b0329b0
launchpad.net/bugs/cve/CVE-2021-47158
nvd.nist.gov/vuln/detail/CVE-2021-47158
security-tracker.debian.org/tracker/CVE-2021-47158
www.cve.org/CVERecord?id=CVE-2021-47158