U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2021-47314 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: memory: fsl_ifc: fix leak of private memory on probe failure On probe error the driver should free the memory allocated for private structure. Fix this by using resource-managed allocation.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/3b45b8a7d549bd92ec94b5357c2c2c1a7ed107e4
https://git.kernel.org/stable/c/3b45b8a7d549bd92ec94b5357c2c2c1a7ed107e4
https://git.kernel.org/stable/c/443f6ca6fd186b4fa4e6f377b6e19a91feb1a0d5
https://git.kernel.org/stable/c/443f6ca6fd186b4fa4e6f377b6e19a91feb1a0d5
https://git.kernel.org/stable/c/48ee69825f7480622ed447b0249123236d3b3ad0
https://git.kernel.org/stable/c/48ee69825f7480622ed447b0249123236d3b3ad0
https://git.kernel.org/stable/c/7626ffbea708e5aba6912295c012d2b409a1769f
https://git.kernel.org/stable/c/7626ffbea708e5aba6912295c012d2b409a1769f
https://git.kernel.org/stable/c/8018476756066e97ecb886c3dc024aeb7d5792ad
https://git.kernel.org/stable/c/8018476756066e97ecb886c3dc024aeb7d5792ad
https://git.kernel.org/stable/c/8e0d09b1232d0538066c40ed4c13086faccbdff6
https://git.kernel.org/stable/c/8e0d09b1232d0538066c40ed4c13086faccbdff6
https://git.kernel.org/stable/c/a6b45b4932f7b0c36b41fb56a35ad679ece939a0
https://git.kernel.org/stable/c/a6b45b4932f7b0c36b41fb56a35ad679ece939a0
https://git.kernel.org/stable/c/b5789e23773f4a852fbfe244b63f675e265d3a7f
https://git.kernel.org/stable/c/b5789e23773f4a852fbfe244b63f675e265d3a7f
https://git.kernel.org/stable/c/ee1aa737ba0b75ab8af3444c4ae5bdba36aed6e6
https://git.kernel.org/stable/c/ee1aa737ba0b75ab8af3444c4ae5bdba36aed6e6

Weakness Enumeration

CWE-ID CWE Name Source

Change History

3 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2021-47314
NVD Published Date:
05/21/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org