In the Linux kernel, the following vulnerability has been resolved: tty:
serial: 8250: serial_cs: Fix a memory leak in error handling path In the
probe function, if the final ‘serial_config()’ fails, ‘info’ is leaking.
Add a resource handling path to free this memory.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/fad92b11047a748c996ebd6cfb164a63814eeb2e (5.14-rc1)
git.kernel.org/stable/c/331f5923fce4f45b8170ccf06c529e8eb28f37bc
git.kernel.org/stable/c/34f4590f5ec9859ea9136249f528173d150bd584
git.kernel.org/stable/c/7a80f71601af015856a0aeb1e3c294037ac3dd32
git.kernel.org/stable/c/b2ef1f5de40342de44fc5355321595f91774dab5
git.kernel.org/stable/c/b5a2799cd62ed30c81b22c23028d9ee374e2138c
git.kernel.org/stable/c/c39cf4df19acf0133fa284a8cd83fad42cd13cc2
git.kernel.org/stable/c/cddee5c287e26f6b2ba5c0ffdfc3a846f2f10461
git.kernel.org/stable/c/ee16bed959862a6de2913f71a04cb563d7237b67
git.kernel.org/stable/c/fad92b11047a748c996ebd6cfb164a63814eeb2e
launchpad.net/bugs/cve/CVE-2021-47330
nvd.nist.gov/vuln/detail/CVE-2021-47330
security-tracker.debian.org/tracker/CVE-2021-47330
www.cve.org/CVERecord?id=CVE-2021-47330