{"id":"CVE-2021-47426","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, s390: Fix potential memory leak about jit_data\n\nMake sure to free jit_data through kfree() in the error path.","modified":"2026-03-15T22:00:19.966281Z","published":"2024-05-21T15:15:28.027Z","related":["SUSE-SU-2024:2008-1","SUSE-SU-2024:2010-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2185-1","SUSE-SU-2024:2189-1","SUSE-SU-2024:2190-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/686cb8b9f6b46787f035afe8fbd132a74e6b1bdd"},{"type":"FIX","url":"https://git.kernel.org/stable/c/a326f9c01cfbee4450ae49ce618ae6cbc0f76842"},{"type":"FIX","url":"https://git.kernel.org/stable/c/d590a410e472417a22336c7c37685bfb38e801f2"},{"type":"FIX","url":"https://git.kernel.org/stable/c/29fdb11ca88d3c490a3d56f0dc77eb9444d086be"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47426.json","unresolved_ranges":[{"events":[{"introduced":"5.4"},{"fixed":"5.4.153"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.73"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.14.12"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc4"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}