In the Linux kernel, the following vulnerability has been resolved:
spi: spi-fsl-dspi: Fix a resource leak in an error handling path
'dspi_request_dma()' should be undone by a 'dspi_release_dma()' call in the
error handling path of the probe function, as already done in the remove
function
References
Configurations
Configuration 1 (hide)
|
History
19 Mar 2025, 16:28
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/00450ed03a17143e2433b461a656ef9cd17c2f1d - Patch | |
References | () https://git.kernel.org/stable/c/10a089bae827ec30ad9b6cb7048020a62fae0cfa - Patch | |
References | () https://git.kernel.org/stable/c/12391be4724acc9269e1845ccbd881df37de4b56 - Patch | |
References | () https://git.kernel.org/stable/c/15d1cc4b4b585f9a2ce72c52cca004d5d735bdf1 - Patch | |
References | () https://git.kernel.org/stable/c/680ec0549a055eb464dce6ffb4bfb736ef87236e - Patch | |
References | () https://git.kernel.org/stable/c/fe6921e3b8451a537e01c031b8212366bb386e3e - Patch |
Information
Published : 2024-03-25 10:15
Updated : 2025-03-19 16:28
NVD link : CVE-2021-47161
Mitre link : CVE-2021-47161
CVE.ORG link : CVE-2021-47161
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-209
Generation of Error Message Containing Sensitive Information