Lucene search

K
cveLinuxCVE-2021-47403
HistoryMay 21, 2024 - 3:15 p.m.

CVE-2021-47403

2024-05-2115:15:25
CWE-200
Linux
web.nvd.nist.gov
42
linux kernel
ipack
vulnerability

CVSS3

7.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

AI Score

6.7

Confidence

Low

EPSS

0

Percentile

13.0%

In the Linux kernel, the following vulnerability has been resolved:

ipack: ipoctal: fix module reference leak

A reference to the carrier module was taken on every open but was only
released once when the final reference to the tty struct was dropped.

Fix this by taking the module reference and initialising the tty driver
data when installing the tty.

Affected configurations

Vulners
Node
linuxlinux_kernelRange3.184.4.286
OR
linuxlinux_kernelRange4.5.04.9.285
OR
linuxlinux_kernelRange4.10.04.14.249
OR
linuxlinux_kernelRange4.15.04.19.209
OR
linuxlinux_kernelRange4.20.05.4.151
OR
linuxlinux_kernelRange5.5.05.10.71
OR
linuxlinux_kernelRange5.11.05.14.10
OR
linuxlinux_kernelRange5.15.0
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/ipack/devices/ipoctal.c"
    ],
    "versions": [
      {
        "version": "82a82340bab6",
        "lessThan": "31398849b84e",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "82a82340bab6",
        "lessThan": "c0adb5a947de",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "82a82340bab6",
        "lessThan": "dde4c1429b97",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "82a82340bab6",
        "lessThan": "9c5b77a7ffc9",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "82a82340bab6",
        "lessThan": "3253c87e1e5b",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "82a82340bab6",
        "lessThan": "7cea84867847",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "82a82340bab6",
        "lessThan": "811178f296b1",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "82a82340bab6",
        "lessThan": "bb8a4fcb2136",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/ipack/devices/ipoctal.c"
    ],
    "versions": [
      {
        "version": "3.18",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "3.18",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.4.286",
        "lessThanOrEqual": "4.4.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.9.285",
        "lessThanOrEqual": "4.9.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.14.249",
        "lessThanOrEqual": "4.14.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.19.209",
        "lessThanOrEqual": "4.19.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.4.151",
        "lessThanOrEqual": "5.4.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.71",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.14.10",
        "lessThanOrEqual": "5.14.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

CVSS3

7.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

AI Score

6.7

Confidence

Low

EPSS

0

Percentile

13.0%