CVE-2021-47314 (GCVE-0-2021-47314)
Vulnerability from cvelistv5
Published
2024-05-21 14:35
Modified
2025-05-04 07:08
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: memory: fsl_ifc: fix leak of private memory on probe failure On probe error the driver should free the memory allocated for private structure. Fix this by using resource-managed allocation.
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/3b45b8a7d549bd92ec94b5357c2c2c1a7ed107e4 Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/443f6ca6fd186b4fa4e6f377b6e19a91feb1a0d5 Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/48ee69825f7480622ed447b0249123236d3b3ad0 Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/7626ffbea708e5aba6912295c012d2b409a1769f Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/8018476756066e97ecb886c3dc024aeb7d5792ad Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/8e0d09b1232d0538066c40ed4c13086faccbdff6 Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/a6b45b4932f7b0c36b41fb56a35ad679ece939a0 Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/b5789e23773f4a852fbfe244b63f675e265d3a7f Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/ee1aa737ba0b75ab8af3444c4ae5bdba36aed6e6 Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/3b45b8a7d549bd92ec94b5357c2c2c1a7ed107e4 Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/443f6ca6fd186b4fa4e6f377b6e19a91feb1a0d5 Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/48ee69825f7480622ed447b0249123236d3b3ad0 Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/7626ffbea708e5aba6912295c012d2b409a1769f Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/8018476756066e97ecb886c3dc024aeb7d5792ad Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/8e0d09b1232d0538066c40ed4c13086faccbdff6 Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/a6b45b4932f7b0c36b41fb56a35ad679ece939a0 Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/b5789e23773f4a852fbfe244b63f675e265d3a7f Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/ee1aa737ba0b75ab8af3444c4ae5bdba36aed6e6 Patch
Impacted products
Vendor Product Version
Linux Linux Version: a20cbdeffce247a2b6fb83cd8d22433994068565
Version: a20cbdeffce247a2b6fb83cd8d22433994068565
Version: a20cbdeffce247a2b6fb83cd8d22433994068565
Version: a20cbdeffce247a2b6fb83cd8d22433994068565
Version: a20cbdeffce247a2b6fb83cd8d22433994068565
Version: a20cbdeffce247a2b6fb83cd8d22433994068565
Version: a20cbdeffce247a2b6fb83cd8d22433994068565
Version: a20cbdeffce247a2b6fb83cd8d22433994068565
Version: a20cbdeffce247a2b6fb83cd8d22433994068565
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-47314",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-12T15:01:45.605125Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-12T15:01:55.389Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:32:08.534Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/8018476756066e97ecb886c3dc024aeb7d5792ad"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/3b45b8a7d549bd92ec94b5357c2c2c1a7ed107e4"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/7626ffbea708e5aba6912295c012d2b409a1769f"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/ee1aa737ba0b75ab8af3444c4ae5bdba36aed6e6"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/443f6ca6fd186b4fa4e6f377b6e19a91feb1a0d5"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/b5789e23773f4a852fbfe244b63f675e265d3a7f"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/48ee69825f7480622ed447b0249123236d3b3ad0"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/a6b45b4932f7b0c36b41fb56a35ad679ece939a0"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/8e0d09b1232d0538066c40ed4c13086faccbdff6"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/memory/fsl_ifc.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "8018476756066e97ecb886c3dc024aeb7d5792ad",
              "status": "affected",
              "version": "a20cbdeffce247a2b6fb83cd8d22433994068565",
              "versionType": "git"
            },
            {
              "lessThan": "3b45b8a7d549bd92ec94b5357c2c2c1a7ed107e4",
              "status": "affected",
              "version": "a20cbdeffce247a2b6fb83cd8d22433994068565",
              "versionType": "git"
            },
            {
              "lessThan": "7626ffbea708e5aba6912295c012d2b409a1769f",
              "status": "affected",
              "version": "a20cbdeffce247a2b6fb83cd8d22433994068565",
              "versionType": "git"
            },
            {
              "lessThan": "ee1aa737ba0b75ab8af3444c4ae5bdba36aed6e6",
              "status": "affected",
              "version": "a20cbdeffce247a2b6fb83cd8d22433994068565",
              "versionType": "git"
            },
            {
              "lessThan": "443f6ca6fd186b4fa4e6f377b6e19a91feb1a0d5",
              "status": "affected",
              "version": "a20cbdeffce247a2b6fb83cd8d22433994068565",
              "versionType": "git"
            },
            {
              "lessThan": "b5789e23773f4a852fbfe244b63f675e265d3a7f",
              "status": "affected",
              "version": "a20cbdeffce247a2b6fb83cd8d22433994068565",
              "versionType": "git"
            },
            {
              "lessThan": "48ee69825f7480622ed447b0249123236d3b3ad0",
              "status": "affected",
              "version": "a20cbdeffce247a2b6fb83cd8d22433994068565",
              "versionType": "git"
            },
            {
              "lessThan": "a6b45b4932f7b0c36b41fb56a35ad679ece939a0",
              "status": "affected",
              "version": "a20cbdeffce247a2b6fb83cd8d22433994068565",
              "versionType": "git"
            },
            {
              "lessThan": "8e0d09b1232d0538066c40ed4c13086faccbdff6",
              "status": "affected",
              "version": "a20cbdeffce247a2b6fb83cd8d22433994068565",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/memory/fsl_ifc.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "3.3"
            },
            {
              "lessThan": "3.3",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.4.*",
              "status": "unaffected",
              "version": "4.4.276",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.9.*",
              "status": "unaffected",
              "version": "4.9.276",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.240",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.198",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.134",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.52",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.12.*",
              "status": "unaffected",
              "version": "5.12.19",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.13.*",
              "status": "unaffected",
              "version": "5.13.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.14",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.4.276",
                  "versionStartIncluding": "3.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.9.276",
                  "versionStartIncluding": "3.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.240",
                  "versionStartIncluding": "3.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.198",
                  "versionStartIncluding": "3.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.134",
                  "versionStartIncluding": "3.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.52",
                  "versionStartIncluding": "3.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.12.19",
                  "versionStartIncluding": "3.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.13.4",
                  "versionStartIncluding": "3.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.14",
                  "versionStartIncluding": "3.3",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemory: fsl_ifc: fix leak of private memory on probe failure\n\nOn probe error the driver should free the memory allocated for private\nstructure.  Fix this by using resource-managed allocation."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T07:08:30.629Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/8018476756066e97ecb886c3dc024aeb7d5792ad"
        },
        {
          "url": "https://git.kernel.org/stable/c/3b45b8a7d549bd92ec94b5357c2c2c1a7ed107e4"
        },
        {
          "url": "https://git.kernel.org/stable/c/7626ffbea708e5aba6912295c012d2b409a1769f"
        },
        {
          "url": "https://git.kernel.org/stable/c/ee1aa737ba0b75ab8af3444c4ae5bdba36aed6e6"
        },
        {
          "url": "https://git.kernel.org/stable/c/443f6ca6fd186b4fa4e6f377b6e19a91feb1a0d5"
        },
        {
          "url": "https://git.kernel.org/stable/c/b5789e23773f4a852fbfe244b63f675e265d3a7f"
        },
        {
          "url": "https://git.kernel.org/stable/c/48ee69825f7480622ed447b0249123236d3b3ad0"
        },
        {
          "url": "https://git.kernel.org/stable/c/a6b45b4932f7b0c36b41fb56a35ad679ece939a0"
        },
        {
          "url": "https://git.kernel.org/stable/c/8e0d09b1232d0538066c40ed4c13086faccbdff6"
        }
      ],
      "title": "memory: fsl_ifc: fix leak of private memory on probe failure",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2021-47314",
    "datePublished": "2024-05-21T14:35:31.274Z",
    "dateReserved": "2024-05-21T14:28:16.973Z",
    "dateUpdated": "2025-05-04T07:08:30.629Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-47314\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-05-21T15:15:18.790\",\"lastModified\":\"2024-12-24T16:38:21.477\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmemory: fsl_ifc: fix leak of private memory on probe failure\\n\\nOn probe error the driver should free the memory allocated for private\\nstructure.  Fix this by using resource-managed allocation.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: memoria: fsl_ifc: corrige la p\u00e9rdida de memoria privada en caso de fallo de la sonda. En caso de error de la sonda, el controlador debe liberar la memoria asignada para la estructura privada. Solucione este problema utilizando la asignaci\u00f3n administrada de recursos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.3\",\"versionEndExcluding\":\"4.4.276\",\"matchCriteriaId\":\"9CEBE0AA-E877-4CEA-A51A-08AD8EBB6F8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5\",\"versionEndExcluding\":\"4.9.276\",\"matchCriteriaId\":\"C79FFC06-9530-4CD7-B651-01D786CC925E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.14.240\",\"matchCriteriaId\":\"FB359B2E-773D-4D52-9915-E07A47ABE72B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.198\",\"matchCriteriaId\":\"B93AEDB9-C52B-4222-8F9A-882DAD9EF5B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.134\",\"matchCriteriaId\":\"508D9771-335F-44A6-9F2F-880DF1267A1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.52\",\"matchCriteriaId\":\"7C1E6FB6-53C8-4DC4-8AE5-93094BA39F62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.12.19\",\"matchCriteriaId\":\"34C1A2F4-DD44-4CF1-8FD4-751A0D746A9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.13\",\"versionEndExcluding\":\"5.13.4\",\"matchCriteriaId\":\"F93FA3CC-0C79-410B-A7D7-245C2AA0723A\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/3b45b8a7d549bd92ec94b5357c2c2c1a7ed107e4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/443f6ca6fd186b4fa4e6f377b6e19a91feb1a0d5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/48ee69825f7480622ed447b0249123236d3b3ad0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/7626ffbea708e5aba6912295c012d2b409a1769f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8018476756066e97ecb886c3dc024aeb7d5792ad\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8e0d09b1232d0538066c40ed4c13086faccbdff6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a6b45b4932f7b0c36b41fb56a35ad679ece939a0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b5789e23773f4a852fbfe244b63f675e265d3a7f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ee1aa737ba0b75ab8af3444c4ae5bdba36aed6e6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/3b45b8a7d549bd92ec94b5357c2c2c1a7ed107e4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/443f6ca6fd186b4fa4e6f377b6e19a91feb1a0d5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/48ee69825f7480622ed447b0249123236d3b3ad0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/7626ffbea708e5aba6912295c012d2b409a1769f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8018476756066e97ecb886c3dc024aeb7d5792ad\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8e0d09b1232d0538066c40ed4c13086faccbdff6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a6b45b4932f7b0c36b41fb56a35ad679ece939a0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b5789e23773f4a852fbfe244b63f675e265d3a7f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ee1aa737ba0b75ab8af3444c4ae5bdba36aed6e6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/8018476756066e97ecb886c3dc024aeb7d5792ad\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/3b45b8a7d549bd92ec94b5357c2c2c1a7ed107e4\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/7626ffbea708e5aba6912295c012d2b409a1769f\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/ee1aa737ba0b75ab8af3444c4ae5bdba36aed6e6\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/443f6ca6fd186b4fa4e6f377b6e19a91feb1a0d5\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/b5789e23773f4a852fbfe244b63f675e265d3a7f\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/48ee69825f7480622ed447b0249123236d3b3ad0\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/a6b45b4932f7b0c36b41fb56a35ad679ece939a0\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/8e0d09b1232d0538066c40ed4c13086faccbdff6\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T05:32:08.534Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-47314\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-12T15:01:45.605125Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-12T15:01:50.614Z\"}}], \"cna\": {\"title\": \"memory: fsl_ifc: fix leak of private memory on probe failure\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"a20cbdeffce2\", \"lessThan\": \"801847675606\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a20cbdeffce2\", \"lessThan\": \"3b45b8a7d549\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a20cbdeffce2\", \"lessThan\": \"7626ffbea708\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a20cbdeffce2\", \"lessThan\": \"ee1aa737ba0b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a20cbdeffce2\", \"lessThan\": \"443f6ca6fd18\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a20cbdeffce2\", \"lessThan\": \"b5789e23773f\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a20cbdeffce2\", \"lessThan\": \"48ee69825f74\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a20cbdeffce2\", \"lessThan\": \"a6b45b4932f7\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a20cbdeffce2\", \"lessThan\": \"8e0d09b1232d\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/memory/fsl_ifc.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.3\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"3.3\", \"versionType\": \"custom\"}, {\"status\": \"unaffected\", \"version\": \"4.4.276\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.4.*\"}, {\"status\": \"unaffected\", \"version\": \"4.9.276\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.9.*\"}, {\"status\": \"unaffected\", \"version\": \"4.14.240\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.14.*\"}, {\"status\": \"unaffected\", \"version\": \"4.19.198\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.134\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.52\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.12.19\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"5.12.*\"}, {\"status\": \"unaffected\", \"version\": \"5.13.4\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"5.13.*\"}, {\"status\": \"unaffected\", \"version\": \"5.14\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/memory/fsl_ifc.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/8018476756066e97ecb886c3dc024aeb7d5792ad\"}, {\"url\": \"https://git.kernel.org/stable/c/3b45b8a7d549bd92ec94b5357c2c2c1a7ed107e4\"}, {\"url\": \"https://git.kernel.org/stable/c/7626ffbea708e5aba6912295c012d2b409a1769f\"}, {\"url\": \"https://git.kernel.org/stable/c/ee1aa737ba0b75ab8af3444c4ae5bdba36aed6e6\"}, {\"url\": \"https://git.kernel.org/stable/c/443f6ca6fd186b4fa4e6f377b6e19a91feb1a0d5\"}, {\"url\": \"https://git.kernel.org/stable/c/b5789e23773f4a852fbfe244b63f675e265d3a7f\"}, {\"url\": \"https://git.kernel.org/stable/c/48ee69825f7480622ed447b0249123236d3b3ad0\"}, {\"url\": \"https://git.kernel.org/stable/c/a6b45b4932f7b0c36b41fb56a35ad679ece939a0\"}, {\"url\": \"https://git.kernel.org/stable/c/8e0d09b1232d0538066c40ed4c13086faccbdff6\"}], \"x_generator\": {\"engine\": \"bippy-a5840b7849dd\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmemory: fsl_ifc: fix leak of private memory on probe failure\\n\\nOn probe error the driver should free the memory allocated for private\\nstructure.  Fix this by using resource-managed allocation.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-05-29T05:05:48.231Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2021-47314\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-04T05:32:08.534Z\", \"dateReserved\": \"2024-05-21T14:28:16.973Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-05-21T14:35:31.274Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…