In the Linux kernel, the following vulnerability has been resolved:
ACPI: scan: Fix a memory leak in an error handling path
If 'acpidevicesetname()' fails, we must free 'acpidevicebusid->bus_id' or there is a (potential) memory leak.
[
{
"events": [
{
"introduced": "4.9.264"
},
{
"fixed": "4.9.269"
}
]
},
{
"events": [
{
"introduced": "4.14.228"
},
{
"fixed": "4.14.233"
}
]
},
{
"events": [
{
"introduced": "4.19.184"
},
{
"fixed": "4.19.191"
}
]
},
{
"events": [
{
"introduced": "5.4.109"
},
{
"fixed": "5.4.120"
}
]
},
{
"events": [
{
"introduced": "5.10.27"
},
{
"fixed": "5.10.38"
}
]
},
{
"events": [
{
"introduced": "5.11.11"
},
{
"fixed": "5.11.22"
}
]
},
{
"events": [
{
"introduced": "5.12"
},
{
"fixed": "5.12.5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.13-rc1"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-46985.json"