CVE-2021-47403

In the Linux kernel, the following vulnerability has been resolved: ipack: ipoctal: fix module reference leak A reference to the carrier module was taken on every open but was only released once when the final reference to the tty struct was dropped. Fix this by taking the module reference and initialising the tty driver data when installing the tty.
Configurations

No configuration.

History

21 Nov 2024, 06:36

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/31398849b84ebae0d43a1cf379cb9895597f221a - () https://git.kernel.org/stable/c/31398849b84ebae0d43a1cf379cb9895597f221a -
References () https://git.kernel.org/stable/c/3253c87e1e5bc0107aab773af2f135ebccf38666 - () https://git.kernel.org/stable/c/3253c87e1e5bc0107aab773af2f135ebccf38666 -
References () https://git.kernel.org/stable/c/7cea848678470daadbfdaa6a112b823c290f900c - () https://git.kernel.org/stable/c/7cea848678470daadbfdaa6a112b823c290f900c -
References () https://git.kernel.org/stable/c/811178f296b16af30264def74c8d2179a72d5562 - () https://git.kernel.org/stable/c/811178f296b16af30264def74c8d2179a72d5562 -
References () https://git.kernel.org/stable/c/9c5b77a7ffc983b2429ce158b50497c5d3c86a69 - () https://git.kernel.org/stable/c/9c5b77a7ffc983b2429ce158b50497c5d3c86a69 -
References () https://git.kernel.org/stable/c/bb8a4fcb2136508224c596a7e665bdba1d7c3c27 - () https://git.kernel.org/stable/c/bb8a4fcb2136508224c596a7e665bdba1d7c3c27 -
References () https://git.kernel.org/stable/c/c0adb5a947dec6cff7050ec56d78ecd3916f9ce6 - () https://git.kernel.org/stable/c/c0adb5a947dec6cff7050ec56d78ecd3916f9ce6 -
References () https://git.kernel.org/stable/c/dde4c1429b97383689f755ce92b4ed1e84a9c92b - () https://git.kernel.org/stable/c/dde4c1429b97383689f755ce92b4ed1e84a9c92b -

03 Jul 2024, 01:37

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: ipack: ipoctal: reparar fuga de referencia del módulo. Se tomó una referencia al módulo portador en cada apertura, pero solo se publicó una vez cuando se eliminó la referencia final a la estructura tty. Solucione este problema tomando la referencia del módulo e inicializando los datos del controlador tty al instalar el tty.
CWE CWE-200

21 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 15:15

Updated : 2024-11-21 06:36


NVD link : CVE-2021-47403

Mitre link : CVE-2021-47403

CVE.ORG link : CVE-2021-47403


JSON object : View

Products Affected

No product.

CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor