{"id":"CVE-2021-47121","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: caif: fix memory leak in cfusbl_device_notify\n\nIn case of caif_enroll_dev() fail, allocated\nlink_support won't be assigned to the corresponding\nstructure. So simply free allocated pointer in case\nof error.","modified":"2026-03-15T22:43:06.031853Z","published":"2024-03-15T21:15:07.107Z","references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/9ea0ab48e755d8f29fe89eb235fb86176fdb597f"},{"type":"FIX","url":"https://git.kernel.org/stable/c/cc302e30a504e6b60a9ac8df7988646f46cd0294"},{"type":"FIX","url":"https://git.kernel.org/stable/c/dde8686985ec24d6b00487080a906609bd613ea1"},{"type":"FIX","url":"https://git.kernel.org/stable/c/e8b37f5009ea7095529790f022859711e6939c76"},{"type":"FIX","url":"https://git.kernel.org/stable/c/46403c1f80b0d3f937ff9c4f5edc63bb64bc5051"},{"type":"FIX","url":"https://git.kernel.org/stable/c/4d94f530cd24c85aede6e72b8923f371b45d6886"},{"type":"FIX","url":"https://git.kernel.org/stable/c/7f5d86669fa4d485523ddb1d212e0a2d90bd62bb"},{"type":"FIX","url":"https://git.kernel.org/stable/c/81afc61cb6e2b553f2c5f992fa79e0ae73857141"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"3.3"},{"fixed":"4.4.272"}]},{"events":[{"introduced":"4.5"},{"fixed":"4.9.272"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.14.236"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.194"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.125"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.43"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.12.10"}]},{"events":[{"introduced":"0"},{"last_affected":"5.13-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.13-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.13-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"5.13-rc4"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47121.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}