2024-07-14 02:06:08 +00:00

37 lines
1.8 KiB
JSON

{
"id": "CVE-2021-47071",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-01T22:15:46.967",
"lastModified": "2024-03-01T22:22:25.913",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Fix a memory leak in error handling paths\n\nIf 'vmbus_establish_gpadl()' fails, the (recv|send)_gpadl will not be\nupdated and 'hv_uio_cleanup()' in the error handling path will not be\nable to free the corresponding buffer.\n\nIn such a case, we need to free the buffer explicitly."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: uio_hv_generic: corrige una p\u00e9rdida de memoria en las rutas de manejo de errores. Si falla 'vmbus_establecer_gpadl()', (recv|send)_gpadl no se actualizar\u00e1 y aparecer\u00e1 'hv_uio_cleanup()' en el error La ruta de manejo no podr\u00e1 liberar el b\u00fafer correspondiente. En tal caso, necesitamos liberar el b\u00fafer expl\u00edcitamente."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/3ee098f96b8b6c1a98f7f97915f8873164e6af9d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/53486c467e356e06aa37047c984fccd64d78c827",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cdd91637d4ef33e2be19a8e16e72e7d00c996d76",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d84b5e912212b05f6b5bde9f682046accfbe0354",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}