CVE-2021-47161

In the Linux kernel, the following vulnerability has been resolved: spi: spi-fsl-dspi: Fix a resource leak in an error handling path 'dspi_request_dma()' should be undone by a 'dspi_release_dma()' call in the error handling path of the probe function, as already done in the remove function
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*

History

19 Mar 2025, 16:28

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/00450ed03a17143e2433b461a656ef9cd17c2f1d - () https://git.kernel.org/stable/c/00450ed03a17143e2433b461a656ef9cd17c2f1d - Patch
References () https://git.kernel.org/stable/c/10a089bae827ec30ad9b6cb7048020a62fae0cfa - () https://git.kernel.org/stable/c/10a089bae827ec30ad9b6cb7048020a62fae0cfa - Patch
References () https://git.kernel.org/stable/c/12391be4724acc9269e1845ccbd881df37de4b56 - () https://git.kernel.org/stable/c/12391be4724acc9269e1845ccbd881df37de4b56 - Patch
References () https://git.kernel.org/stable/c/15d1cc4b4b585f9a2ce72c52cca004d5d735bdf1 - () https://git.kernel.org/stable/c/15d1cc4b4b585f9a2ce72c52cca004d5d735bdf1 - Patch
References () https://git.kernel.org/stable/c/680ec0549a055eb464dce6ffb4bfb736ef87236e - () https://git.kernel.org/stable/c/680ec0549a055eb464dce6ffb4bfb736ef87236e - Patch
References () https://git.kernel.org/stable/c/fe6921e3b8451a537e01c031b8212366bb386e3e - () https://git.kernel.org/stable/c/fe6921e3b8451a537e01c031b8212366bb386e3e - Patch
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/00450ed03a17143e2433b461a656ef9cd17c2f1d - () https://git.kernel.org/stable/c/00450ed03a17143e2433b461a656ef9cd17c2f1d -
References () https://git.kernel.org/stable/c/10a089bae827ec30ad9b6cb7048020a62fae0cfa - () https://git.kernel.org/stable/c/10a089bae827ec30ad9b6cb7048020a62fae0cfa -
References () https://git.kernel.org/stable/c/12391be4724acc9269e1845ccbd881df37de4b56 - () https://git.kernel.org/stable/c/12391be4724acc9269e1845ccbd881df37de4b56 -
References () https://git.kernel.org/stable/c/15d1cc4b4b585f9a2ce72c52cca004d5d735bdf1 - () https://git.kernel.org/stable/c/15d1cc4b4b585f9a2ce72c52cca004d5d735bdf1 -
References () https://git.kernel.org/stable/c/680ec0549a055eb464dce6ffb4bfb736ef87236e - () https://git.kernel.org/stable/c/680ec0549a055eb464dce6ffb4bfb736ef87236e -
References () https://git.kernel.org/stable/c/fe6921e3b8451a537e01c031b8212366bb386e3e - () https://git.kernel.org/stable/c/fe6921e3b8451a537e01c031b8212366bb386e3e -

06 Nov 2024, 15:35

Type Values Removed Values Added
CWE CWE-209
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

25 Mar 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-25 10:15

Updated : 2025-03-19 16:28


NVD link : CVE-2021-47161

Mitre link : CVE-2021-47161

CVE.ORG link : CVE-2021-47161


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-209

Generation of Error Message Containing Sensitive Information