Unrated severityNVD Advisory· Published May 21, 2024· Updated Dec 18, 2025
virtio-blk: Fix memory leak among suspend/resume procedure
CVE-2021-47319
Description
In the Linux kernel, the following vulnerability has been resolved:
virtio-blk: Fix memory leak among suspend/resume procedure
The vblk->vqs should be freed before we call init_vqs() in virtblk_restore().
Affected products
24- osv-coords22 versionspkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP5pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_57&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5
< 4.12.14-16.188.1+ 21 more
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-10.188.1
- (no CPE)range: < 4.12.14-10.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-10.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-10.188.1
- (no CPE)range: < 1-8.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- git.kernel.org/stable/c/04c6e60b884cb5e94ff32af46867fb41d5848358mitre
- git.kernel.org/stable/c/102d6bc6475ab09bab579c18704e6cf8d898e93cmitre
- git.kernel.org/stable/c/29a2f4a3214aa14d61cc9737c9f886dae9dbb710mitre
- git.kernel.org/stable/c/381bde79d11e596002edfd914e6714291826967amitre
- git.kernel.org/stable/c/600942d2fd49b90e44857d20c774b20d16f3130fmitre
- git.kernel.org/stable/c/863da837964c80c72e368a4f748c30d25daa1815mitre
- git.kernel.org/stable/c/b71ba22e7c6c6b279c66f53ee7818709774efa1fmitre
- git.kernel.org/stable/c/ca2b8ae93a6da9839dc7f9eb9199b18aa03c3daemitre
- git.kernel.org/stable/c/cd24da0db9f75ca11eaf6060f0ccb90e2f3be3b0mitre
News mentions
0No linked articles in our index yet.