CVE-2021-47329

In the Linux kernel, the following vulnerability has been resolved: scsi: megaraid_sas: Fix resource leak in case of probe failure The driver doesn't clean up all the allocated resources properly when scsi_add_host(), megasas_start_aen() function fails during the PCI device probe. Clean up all those resources.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

02 Apr 2025, 14:32

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/04b6b9ea80906e3b41ff120b45db31768947cf72 - () https://git.kernel.org/stable/c/04b6b9ea80906e3b41ff120b45db31768947cf72 - Patch
References () https://git.kernel.org/stable/c/0680db6f41920b2c91c7df3cc9cd5968701a6f74 - () https://git.kernel.org/stable/c/0680db6f41920b2c91c7df3cc9cd5968701a6f74 - Patch
References () https://git.kernel.org/stable/c/0c6226601c3e191a44a57d8f9f814b7e5c308959 - () https://git.kernel.org/stable/c/0c6226601c3e191a44a57d8f9f814b7e5c308959 - Patch
References () https://git.kernel.org/stable/c/b5438f48fdd8e1c3f130d32637511efd32038152 - () https://git.kernel.org/stable/c/b5438f48fdd8e1c3f130d32637511efd32038152 - Patch
References () https://git.kernel.org/stable/c/e623f79691c5104317669ab36ec316a90c05062f - () https://git.kernel.org/stable/c/e623f79691c5104317669ab36ec316a90c05062f - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/04b6b9ea80906e3b41ff120b45db31768947cf72 - () https://git.kernel.org/stable/c/04b6b9ea80906e3b41ff120b45db31768947cf72 -
References () https://git.kernel.org/stable/c/0680db6f41920b2c91c7df3cc9cd5968701a6f74 - () https://git.kernel.org/stable/c/0680db6f41920b2c91c7df3cc9cd5968701a6f74 -
References () https://git.kernel.org/stable/c/0c6226601c3e191a44a57d8f9f814b7e5c308959 - () https://git.kernel.org/stable/c/0c6226601c3e191a44a57d8f9f814b7e5c308959 -
References () https://git.kernel.org/stable/c/b5438f48fdd8e1c3f130d32637511efd32038152 - () https://git.kernel.org/stable/c/b5438f48fdd8e1c3f130d32637511efd32038152 -
References () https://git.kernel.org/stable/c/e623f79691c5104317669ab36ec316a90c05062f - () https://git.kernel.org/stable/c/e623f79691c5104317669ab36ec316a90c05062f -

03 Jul 2024, 01:37

Type Values Removed Values Added
CWE CWE-400
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.2
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: megaraid_sas: corrige la fuga de recursos en caso de fallo de la sonda El controlador no limpia todos los recursos asignados correctamente cuando la función scsi_add_host(), megasas_start_aen() falla durante el dispositivo PCI Investigacion. Limpia todos esos recursos.

21 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 15:15

Updated : 2025-04-02 14:32


NVD link : CVE-2021-47329

Mitre link : CVE-2021-47329

CVE.ORG link : CVE-2021-47329


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-400

Uncontrolled Resource Consumption