In the Linux kernel, the following vulnerability has been resolved:
ipack: ipoctal: fix stack information leak
The tty driver name is used also after registering the driver and must
specifically not be allocated on the stack to avoid leaking information
to user space (or triggering an oops).
Drivers should not try to encode topology information in the tty device
name but this one snuck in through staging without anyone noticing and
another driver has since copied this malpractice.
Fixing the ABI is a separate issue, but this at least plugs the security
hole.
References
Configurations
Configuration 1 (hide)
|
History
19 Sep 2025, 14:32
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/0a9c36a2e06a249acbed64e8e0b84637c2ad7575 - Patch | |
References | () https://git.kernel.org/stable/c/2725925982dc96a78069cd118ea3d66759bfdad7 - Patch | |
References | () https://git.kernel.org/stable/c/5f6a309a699675680df15d9b6d389114515b4426 - Patch | |
References | () https://git.kernel.org/stable/c/741ea2670e021350e54f491106bdaa22dc50e6a0 - Patch | |
References | () https://git.kernel.org/stable/c/829f13d6079cf7a2465522f39acb43033e9b320d - Patch | |
References | () https://git.kernel.org/stable/c/8657158a3b68c85234e6da3d8eae33d6183588b7 - Patch | |
References | () https://git.kernel.org/stable/c/a89936cce87d60766a75732a9e7e25c51164f47c - Patch | |
References | () https://git.kernel.org/stable/c/acb96e782bad427ca4bb1bd94af660acd1462380 - Patch | |
CWE | CWE-668 | |
First Time |
Linux
Linux linux Kernel |
21 Nov 2024, 06:36
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://git.kernel.org/stable/c/0a9c36a2e06a249acbed64e8e0b84637c2ad7575 - | |
References | () https://git.kernel.org/stable/c/2725925982dc96a78069cd118ea3d66759bfdad7 - | |
References | () https://git.kernel.org/stable/c/5f6a309a699675680df15d9b6d389114515b4426 - | |
References | () https://git.kernel.org/stable/c/741ea2670e021350e54f491106bdaa22dc50e6a0 - | |
References | () https://git.kernel.org/stable/c/829f13d6079cf7a2465522f39acb43033e9b320d - | |
References | () https://git.kernel.org/stable/c/8657158a3b68c85234e6da3d8eae33d6183588b7 - | |
References | () https://git.kernel.org/stable/c/a89936cce87d60766a75732a9e7e25c51164f47c - | |
References | () https://git.kernel.org/stable/c/acb96e782bad427ca4bb1bd94af660acd1462380 - |
21 May 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-21 15:15
Updated : 2025-09-19 14:32
NVD link : CVE-2021-47401
Mitre link : CVE-2021-47401
CVE.ORG link : CVE-2021-47401
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-668
Exposure of Resource to Wrong Sphere