CVE-2021-47043
- EPSS 0.03%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 09.01.2025 15:21:46
In the Linux kernel, the following vulnerability has been resolved: media: venus: core: Fix some resource leaks in the error path of 'venus_probe()' If an error occurs after a successful 'of_icc_get()' call, it must be undone. Use 'devm_of_icc_get...
CVE-2021-47044
- EPSS 0.02%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 19.03.2025 15:50:56
In the Linux kernel, the following vulnerability has been resolved: sched/fair: Fix shift-out-of-bounds in load_balance() Syzbot reported a handful of occurrences where an sd->nr_balance_failed can grow to much higher values than one would expect. ...
CVE-2021-47045
- EPSS 0.02%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 06.12.2024 18:41:37
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() It is possible to call lpfc_issue_els_plogi() passing a did for which no matching ndlp is found. A call is then mad...
CVE-2021-47046
- EPSS 0.02%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 09.12.2024 19:02:52
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix off by one in hdmi_14_process_transaction() The hdcp_i2c_offsets[] array did not have an entry for HDCP_MESSAGE_ID_WRITE_CONTENT_STREAM_TYPE so it led to an of...
CVE-2021-47047
- EPSS 0.02%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 10.01.2025 18:26:24
In the Linux kernel, the following vulnerability has been resolved: spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails The spi controller supports 44-bit address space on AXI in DMA mode, so set dma_addr_t width to 44-bit to avoid using ...
CVE-2021-47048
- EPSS 0.04%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 09.12.2024 19:05:02
In the Linux kernel, the following vulnerability has been resolved: spi: spi-zynqmp-gqspi: fix use-after-free in zynqmp_qspi_exec_op When handling op->addr, it is using the buffer "tmpbuf" which has been freed. This will trigger a use-after-free KA...
CVE-2021-47049
- EPSS 0.02%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 09.12.2024 19:06:07
In the Linux kernel, the following vulnerability has been resolved: Drivers: hv: vmbus: Use after free in __vmbus_open() The "open_info" variable is added to the &vmbus_connection.chn_msg_list, but the error handling frees "open_info" without remov...
CVE-2021-47050
- EPSS 0.03%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 09.12.2024 19:06:24
In the Linux kernel, the following vulnerability has been resolved: memory: renesas-rpc-if: fix possible NULL pointer dereference of resource The platform_get_resource_byname() can return NULL which would be immediately dereferenced by resource_siz...
CVE-2021-47051
- EPSS 0.02%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 09.12.2024 18:46:41
In the Linux kernel, the following vulnerability has been resolved: spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() pm_runtime_get_sync will increment pm usage counter even it failed. Forgetting to putting operation will resu...
CVE-2021-47052
- EPSS 0.02%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 09.12.2024 18:46:53
In the Linux kernel, the following vulnerability has been resolved: crypto: sa2ul - Fix memory leak of rxd There are two error return paths that are not freeing rxd and causing memory leaks. Fix these. Addresses-Coverity: ("Resource leak")