CVE-2021-47401

In the Linux kernel, the following vulnerability has been resolved: ipack: ipoctal: fix stack information leak The tty driver name is used also after registering the driver and must specifically not be allocated on the stack to avoid leaking information to user space (or triggering an oops). Drivers should not try to encode topology information in the tty device name but this one snuck in through staging without anyone noticing and another driver has since copied this malpractice. Fixing the ABI is a separate issue, but this at least plugs the security hole.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*

History

19 Sep 2025, 14:32

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0a9c36a2e06a249acbed64e8e0b84637c2ad7575 - () https://git.kernel.org/stable/c/0a9c36a2e06a249acbed64e8e0b84637c2ad7575 - Patch
References () https://git.kernel.org/stable/c/2725925982dc96a78069cd118ea3d66759bfdad7 - () https://git.kernel.org/stable/c/2725925982dc96a78069cd118ea3d66759bfdad7 - Patch
References () https://git.kernel.org/stable/c/5f6a309a699675680df15d9b6d389114515b4426 - () https://git.kernel.org/stable/c/5f6a309a699675680df15d9b6d389114515b4426 - Patch
References () https://git.kernel.org/stable/c/741ea2670e021350e54f491106bdaa22dc50e6a0 - () https://git.kernel.org/stable/c/741ea2670e021350e54f491106bdaa22dc50e6a0 - Patch
References () https://git.kernel.org/stable/c/829f13d6079cf7a2465522f39acb43033e9b320d - () https://git.kernel.org/stable/c/829f13d6079cf7a2465522f39acb43033e9b320d - Patch
References () https://git.kernel.org/stable/c/8657158a3b68c85234e6da3d8eae33d6183588b7 - () https://git.kernel.org/stable/c/8657158a3b68c85234e6da3d8eae33d6183588b7 - Patch
References () https://git.kernel.org/stable/c/a89936cce87d60766a75732a9e7e25c51164f47c - () https://git.kernel.org/stable/c/a89936cce87d60766a75732a9e7e25c51164f47c - Patch
References () https://git.kernel.org/stable/c/acb96e782bad427ca4bb1bd94af660acd1462380 - () https://git.kernel.org/stable/c/acb96e782bad427ca4bb1bd94af660acd1462380 - Patch
CWE CWE-668
First Time Linux
Linux linux Kernel

21 Nov 2024, 06:36

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipack: ipoctal: corrige la fuga de información de la pila. El nombre del controlador tty también se usa después de registrar el controlador y específicamente no debe asignarse en la pila para evitar filtrar información al espacio del usuario (o activar un ups). Los controladores no deberían intentar codificar información de topología en el nombre del dispositivo tty, pero este se coló durante la preparación sin que nadie se diera cuenta y desde entonces otro controlador copió esta mala práctica. Arreglar la ABI es un tema aparte, pero esto al menos tapa el agujero de seguridad.
References () https://git.kernel.org/stable/c/0a9c36a2e06a249acbed64e8e0b84637c2ad7575 - () https://git.kernel.org/stable/c/0a9c36a2e06a249acbed64e8e0b84637c2ad7575 -
References () https://git.kernel.org/stable/c/2725925982dc96a78069cd118ea3d66759bfdad7 - () https://git.kernel.org/stable/c/2725925982dc96a78069cd118ea3d66759bfdad7 -
References () https://git.kernel.org/stable/c/5f6a309a699675680df15d9b6d389114515b4426 - () https://git.kernel.org/stable/c/5f6a309a699675680df15d9b6d389114515b4426 -
References () https://git.kernel.org/stable/c/741ea2670e021350e54f491106bdaa22dc50e6a0 - () https://git.kernel.org/stable/c/741ea2670e021350e54f491106bdaa22dc50e6a0 -
References () https://git.kernel.org/stable/c/829f13d6079cf7a2465522f39acb43033e9b320d - () https://git.kernel.org/stable/c/829f13d6079cf7a2465522f39acb43033e9b320d -
References () https://git.kernel.org/stable/c/8657158a3b68c85234e6da3d8eae33d6183588b7 - () https://git.kernel.org/stable/c/8657158a3b68c85234e6da3d8eae33d6183588b7 -
References () https://git.kernel.org/stable/c/a89936cce87d60766a75732a9e7e25c51164f47c - () https://git.kernel.org/stable/c/a89936cce87d60766a75732a9e7e25c51164f47c -
References () https://git.kernel.org/stable/c/acb96e782bad427ca4bb1bd94af660acd1462380 - () https://git.kernel.org/stable/c/acb96e782bad427ca4bb1bd94af660acd1462380 -

21 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 15:15

Updated : 2025-09-19 14:32


NVD link : CVE-2021-47401

Mitre link : CVE-2021-47401

CVE.ORG link : CVE-2021-47401


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-668

Exposure of Resource to Wrong Sphere