5.5
CVE-2021-46968
- EPSS 0.02%
 - Veröffentlicht 27.02.2024 19:04:07
 - Zuletzt bearbeitet 08.01.2025 16:50:33
 - Quelle 416baaa9-dc9f-4396-8d5f-8c081f
 - CVE-Watchlists
 - Unerledigt
 
In the Linux kernel, the following vulnerability has been resolved: s390/zcrypt: fix zcard and zqueue hot-unplug memleak Tests with kvm and a kmemdebug kernel showed, that on hot unplug the zcard and zqueue structs for the unplugged card or queue are not properly freed because of a mismatch with get/put for the embedded kref counter. This fix now adjusts the handling of the kref counters. With init the kref counter starts with 1. This initial value needs to drop to zero with the unregister of the card or queue to trigger the release and free the object.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
	Linux ≫ Linux Kernel  Version >= 5.10 < 5.10.36
	Linux ≫ Linux Kernel  Version >= 5.11 < 5.11.20
	Linux ≫ Linux Kernel  Version >= 5.12 < 5.12.3
| Typ | Quelle | Score | Percentile | 
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.021 | 
| Quelle | Base Score | Exploit Score | Impact Score | Vector String | 
|---|---|---|---|---|
| nvd@nist.gov | 5.5 | 1.8 | 3.6 | 
                 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H  
             | 
        
CWE-401 Missing Release of Memory after Effective Lifetime
The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.