Логотип exploitDog
bind:CVE-2021-46985
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-46985

Количество 6

Количество 6

ubuntu логотип

CVE-2021-46985

почти 2 года назад

In the Linux kernel, the following vulnerability has been resolved: ACPI: scan: Fix a memory leak in an error handling path If 'acpi_device_set_name()' fails, we must free 'acpi_device_bus_id->bus_id' or there is a (potential) memory leak.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2021-46985

почти 2 года назад

In the Linux kernel, the following vulnerability has been resolved: ACPI: scan: Fix a memory leak in an error handling path If 'acpi_device_set_name()' fails, we must free 'acpi_device_bus_id->bus_id' or there is a (potential) memory leak.

CVSS3: 4.4
EPSS: Низкий
nvd логотип

CVE-2021-46985

почти 2 года назад

In the Linux kernel, the following vulnerability has been resolved: ACPI: scan: Fix a memory leak in an error handling path If 'acpi_device_set_name()' fails, we must free 'acpi_device_bus_id->bus_id' or there is a (potential) memory leak.

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2021-46985

почти 2 года назад

In the Linux kernel, the following vulnerability has been resolved: A ...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-7896-9859-h9rc

почти 2 года назад

In the Linux kernel, the following vulnerability has been resolved: ACPI: scan: Fix a memory leak in an error handling path If 'acpi_device_set_name()' fails, we must free 'acpi_device_bus_id->bus_id' or there is a (potential) memory leak.

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2025-05322

больше 4 лет назад

Уязвимость функции acpi_device_add() модуля drivers/acpi/scan.c - драйвера поддержки ACPI (расширенный интерфейс конфигурации и питания) ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации

CVSS3: 5.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-46985

In the Linux kernel, the following vulnerability has been resolved: ACPI: scan: Fix a memory leak in an error handling path If 'acpi_device_set_name()' fails, we must free 'acpi_device_bus_id->bus_id' or there is a (potential) memory leak.

CVSS3: 5.5
0%
Низкий
почти 2 года назад
redhat логотип
CVE-2021-46985

In the Linux kernel, the following vulnerability has been resolved: ACPI: scan: Fix a memory leak in an error handling path If 'acpi_device_set_name()' fails, we must free 'acpi_device_bus_id->bus_id' or there is a (potential) memory leak.

CVSS3: 4.4
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2021-46985

In the Linux kernel, the following vulnerability has been resolved: ACPI: scan: Fix a memory leak in an error handling path If 'acpi_device_set_name()' fails, we must free 'acpi_device_bus_id->bus_id' or there is a (potential) memory leak.

CVSS3: 5.5
0%
Низкий
почти 2 года назад
debian логотип
CVE-2021-46985

In the Linux kernel, the following vulnerability has been resolved: A ...

CVSS3: 5.5
0%
Низкий
почти 2 года назад
github логотип
GHSA-7896-9859-h9rc

In the Linux kernel, the following vulnerability has been resolved: ACPI: scan: Fix a memory leak in an error handling path If 'acpi_device_set_name()' fails, we must free 'acpi_device_bus_id->bus_id' or there is a (potential) memory leak.

CVSS3: 5.5
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2025-05322

Уязвимость функции acpi_device_add() модуля drivers/acpi/scan.c - драйвера поддержки ACPI (расширенный интерфейс конфигурации и питания) ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации

CVSS3: 5.5
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу