In the Linux kernel, the following vulnerability has been resolved:
perf bpf: Avoid memory leak from perfenvinsertbtf()
perfenvinsertbtf() doesn't insert if a duplicate BTF id is encountered and this causes a memory leak. Modify the function to return a success/error value and then free the memory if insertion didn't happen.
v2. Adds a return -1 when the insertion error occurs in perfenvfetchbtf. This doesn't affect anything as the result is never checked.
[
{
"events": [
{
"introduced": "5.1"
},
{
"fixed": "5.4.162"
}
]
},
{
"events": [
{
"introduced": "5.5"
},
{
"fixed": "5.10.82"
}
]
},
{
"events": [
{
"introduced": "5.11"
},
{
"fixed": "5.15.5"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47190.json"