Assigner | Linux |
Reserved | 2024-02-27 |
Published | 2024-02-28 |
Updated | 2024-05-29 |
Description
In the Linux kernel, the following vulnerability has been resolved: ACPI: scan: Fix a memory leak in an error handling path If 'acpi_device_set_name()' fails, we must free 'acpi_device_bus_id->bus_id' or there is a (potential) memory leak.
Product status
e5cdbe419004 before 6901a4f795e0
717d9d88fbd9 before 5ab9857dde7c
7385e438e1f3 before 69cc821e89ce
bc0b1a2036dd before dafd4c0b5e83
4a5891992c68 before e2381174daea
321dbe6c0b55 before c5c8f6ffc942
eb50aaf960e3 before a7e17a8d421a
eb50aaf960e3 before 0c8bd174f0fc
5.12
Any version before 5.12
4.9.269
4.14.233
4.19.191
5.4.120
5.10.38
5.11.22
5.12.5
5.13
References
https://git.kernel.org/stable/c/6901a4f795e0e8d65ae779cb37fc22e0bf294712
https://git.kernel.org/stable/c/5ab9857dde7c3ea3faef6b128d718cf8ba98721b
https://git.kernel.org/stable/c/69cc821e89ce572884548ac54c4f80eec7a837a5
https://git.kernel.org/stable/c/dafd4c0b5e835db020cff11c74b4af9493a58e72
https://git.kernel.org/stable/c/e2381174daeae0ca35eddffef02dcc8de8c1ef8a
https://git.kernel.org/stable/c/c5c8f6ffc942cf42f990f22e35bcf4cbe9d8c2fb
https://git.kernel.org/stable/c/a7e17a8d421ae23c920240625b4413c7b94d94a4
https://git.kernel.org/stable/c/0c8bd174f0fc131bc9dfab35cd8784f59045da87