CVE-2021-46985

In the Linux kernel, the following vulnerability has been resolved: ACPI: scan: Fix a memory leak in an error handling path If 'acpi_device_set_name()' fails, we must free 'acpi_device_bus_id->bus_id' or there is a (potential) memory leak.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*

History

06 Dec 2024, 15:02

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-401
References () https://git.kernel.org/stable/c/0c8bd174f0fc131bc9dfab35cd8784f59045da87 - () https://git.kernel.org/stable/c/0c8bd174f0fc131bc9dfab35cd8784f59045da87 - Patch
References () https://git.kernel.org/stable/c/5ab9857dde7c3ea3faef6b128d718cf8ba98721b - () https://git.kernel.org/stable/c/5ab9857dde7c3ea3faef6b128d718cf8ba98721b - Patch
References () https://git.kernel.org/stable/c/6901a4f795e0e8d65ae779cb37fc22e0bf294712 - () https://git.kernel.org/stable/c/6901a4f795e0e8d65ae779cb37fc22e0bf294712 - Patch
References () https://git.kernel.org/stable/c/69cc821e89ce572884548ac54c4f80eec7a837a5 - () https://git.kernel.org/stable/c/69cc821e89ce572884548ac54c4f80eec7a837a5 - Patch
References () https://git.kernel.org/stable/c/a7e17a8d421ae23c920240625b4413c7b94d94a4 - () https://git.kernel.org/stable/c/a7e17a8d421ae23c920240625b4413c7b94d94a4 - Patch
References () https://git.kernel.org/stable/c/c5c8f6ffc942cf42f990f22e35bcf4cbe9d8c2fb - () https://git.kernel.org/stable/c/c5c8f6ffc942cf42f990f22e35bcf4cbe9d8c2fb - Patch
References () https://git.kernel.org/stable/c/dafd4c0b5e835db020cff11c74b4af9493a58e72 - () https://git.kernel.org/stable/c/dafd4c0b5e835db020cff11c74b4af9493a58e72 - Patch
References () https://git.kernel.org/stable/c/e2381174daeae0ca35eddffef02dcc8de8c1ef8a - () https://git.kernel.org/stable/c/e2381174daeae0ca35eddffef02dcc8de8c1ef8a - Patch
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0c8bd174f0fc131bc9dfab35cd8784f59045da87 - () https://git.kernel.org/stable/c/0c8bd174f0fc131bc9dfab35cd8784f59045da87 -
References () https://git.kernel.org/stable/c/5ab9857dde7c3ea3faef6b128d718cf8ba98721b - () https://git.kernel.org/stable/c/5ab9857dde7c3ea3faef6b128d718cf8ba98721b -
References () https://git.kernel.org/stable/c/6901a4f795e0e8d65ae779cb37fc22e0bf294712 - () https://git.kernel.org/stable/c/6901a4f795e0e8d65ae779cb37fc22e0bf294712 -
References () https://git.kernel.org/stable/c/69cc821e89ce572884548ac54c4f80eec7a837a5 - () https://git.kernel.org/stable/c/69cc821e89ce572884548ac54c4f80eec7a837a5 -
References () https://git.kernel.org/stable/c/a7e17a8d421ae23c920240625b4413c7b94d94a4 - () https://git.kernel.org/stable/c/a7e17a8d421ae23c920240625b4413c7b94d94a4 -
References () https://git.kernel.org/stable/c/c5c8f6ffc942cf42f990f22e35bcf4cbe9d8c2fb - () https://git.kernel.org/stable/c/c5c8f6ffc942cf42f990f22e35bcf4cbe9d8c2fb -
References () https://git.kernel.org/stable/c/dafd4c0b5e835db020cff11c74b4af9493a58e72 - () https://git.kernel.org/stable/c/dafd4c0b5e835db020cff11c74b4af9493a58e72 -
References () https://git.kernel.org/stable/c/e2381174daeae0ca35eddffef02dcc8de8c1ef8a - () https://git.kernel.org/stable/c/e2381174daeae0ca35eddffef02dcc8de8c1ef8a -
Summary
  • (es) En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: ACPI: scan: Corregir pérdida de memoria en una ruta de manejo de errores Si falla 'acpi_device_set_name()' debemos liberar 'acpi_device_bus_id->bus_id' o hay una (potencial) memoria filtración.

28 Feb 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-28 09:15

Updated : 2024-12-06 15:02


NVD link : CVE-2021-46985

Mitre link : CVE-2021-46985

CVE.ORG link : CVE-2021-46985


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime