In the Linux kernel, the following vulnerability has been resolved: ipack:
ipoctal: fix stack information leak The tty driver name is used also after
registering the driver and must specifically not be allocated on the stack
to avoid leaking information to user space (or triggering an oops). Drivers
should not try to encode topology information in the tty device name but
this one snuck in through staging without anyone noticing and another
driver has since copied this malpractice. Fixing the ABI is a separate
issue, but this at least plugs the security hole.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/a89936cce87d60766a75732a9e7e25c51164f47c (5.15-rc4)
git.kernel.org/stable/c/0a9c36a2e06a249acbed64e8e0b84637c2ad7575
git.kernel.org/stable/c/2725925982dc96a78069cd118ea3d66759bfdad7
git.kernel.org/stable/c/5f6a309a699675680df15d9b6d389114515b4426
git.kernel.org/stable/c/741ea2670e021350e54f491106bdaa22dc50e6a0
git.kernel.org/stable/c/829f13d6079cf7a2465522f39acb43033e9b320d
git.kernel.org/stable/c/8657158a3b68c85234e6da3d8eae33d6183588b7
git.kernel.org/stable/c/a89936cce87d60766a75732a9e7e25c51164f47c
git.kernel.org/stable/c/acb96e782bad427ca4bb1bd94af660acd1462380
launchpad.net/bugs/cve/CVE-2021-47401
nvd.nist.gov/vuln/detail/CVE-2021-47401
security-tracker.debian.org/tracker/CVE-2021-47401
www.cve.org/CVERecord?id=CVE-2021-47401