In the Linux kernel, the following vulnerability has been resolved: spi:
spi-fsl-dspi: Fix a resource leak in an error handling path
‘dspi_request_dma()’ should be undone by a ‘dspi_release_dma()’ call in the
error handling path of the probe function, as already done in the remove
function
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws-hwe | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure-4.15 | < any | UNKNOWN |
git.kernel.org/stable/c/00450ed03a17143e2433b461a656ef9cd17c2f1d
git.kernel.org/stable/c/10a089bae827ec30ad9b6cb7048020a62fae0cfa
git.kernel.org/stable/c/12391be4724acc9269e1845ccbd881df37de4b56
git.kernel.org/stable/c/15d1cc4b4b585f9a2ce72c52cca004d5d735bdf1
git.kernel.org/stable/c/680ec0549a055eb464dce6ffb4bfb736ef87236e
git.kernel.org/stable/c/fe6921e3b8451a537e01c031b8212366bb386e3e
launchpad.net/bugs/cve/CVE-2021-47161
nvd.nist.gov/vuln/detail/CVE-2021-47161
security-tracker.debian.org/tracker/CVE-2021-47161
www.cve.org/CVERecord?id=CVE-2021-47161