In the Linux kernel, the following vulnerability has been resolved: rxrpc:
Fix rxrpc_peer leak in rxrpc_look_up_bundle() Need to call rxrpc_put_peer()
for bundle candidate before kfree() as it holds a ref to rxrpc_peer. [DH:
v2: Changed to abstract out the bundle freeing code into a function]
git.kernel.org/linus/ca77fba821351190777b236ce749d7c4d353102e (5.16-rc4)
git.kernel.org/stable/c/35b40f724c4ef0f683d94dab3af9ab38261d782b
git.kernel.org/stable/c/bc97458620e38961af9505cc060ad4cf5c9e4af7
git.kernel.org/stable/c/ca77fba821351190777b236ce749d7c4d353102e
launchpad.net/bugs/cve/CVE-2021-47539
nvd.nist.gov/vuln/detail/CVE-2021-47539
security-tracker.debian.org/tracker/CVE-2021-47539
www.cve.org/CVERecord?id=CVE-2021-47539