Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2021-46968
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-27 Feb, 2024 | 18:47
Updated At-04 May, 2025 | 07:01
Rejected At-
▼CVE Numbering Authority (CNA)
s390/zcrypt: fix zcard and zqueue hot-unplug memleak

In the Linux kernel, the following vulnerability has been resolved: s390/zcrypt: fix zcard and zqueue hot-unplug memleak Tests with kvm and a kmemdebug kernel showed, that on hot unplug the zcard and zqueue structs for the unplugged card or queue are not properly freed because of a mismatch with get/put for the embedded kref counter. This fix now adjusts the handling of the kref counters. With init the kref counter starts with 1. This initial value needs to drop to zero with the unregister of the card or queue to trigger the release and free the object.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/s390/crypto/zcrypt_card.c
  • drivers/s390/crypto/zcrypt_queue.c
Default Status
unaffected
Versions
Affected
  • From 29c2680fd2bf3862ff5cf2957f198512493156f9 before 026499a9c2e002e621ad568d1378324ae97e5524 (git)
  • From 29c2680fd2bf3862ff5cf2957f198512493156f9 before 055a063a18bcd19b93709e3eac8078d6b2f04599 (git)
  • From 29c2680fd2bf3862ff5cf2957f198512493156f9 before 971dc8706cee47393d393905d294ea47e39503d3 (git)
  • From 29c2680fd2bf3862ff5cf2957f198512493156f9 before 70fac8088cfad9f3b379c9082832b4d7532c16c2 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/s390/crypto/zcrypt_card.c
  • drivers/s390/crypto/zcrypt_queue.c
Default Status
affected
Versions
Affected
  • 5.10
Unaffected
  • From 0 before 5.10 (semver)
  • From 5.10.36 through 5.10.* (semver)
  • From 5.11.20 through 5.11.* (semver)
  • From 5.12.3 through 5.12.* (semver)
  • From 5.13 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/026499a9c2e002e621ad568d1378324ae97e5524
N/A
https://git.kernel.org/stable/c/055a063a18bcd19b93709e3eac8078d6b2f04599
N/A
https://git.kernel.org/stable/c/971dc8706cee47393d393905d294ea47e39503d3
N/A
https://git.kernel.org/stable/c/70fac8088cfad9f3b379c9082832b4d7532c16c2
N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/026499a9c2e002e621ad568d1378324ae97e5524
x_transferred
https://git.kernel.org/stable/c/055a063a18bcd19b93709e3eac8078d6b2f04599
x_transferred
https://git.kernel.org/stable/c/971dc8706cee47393d393905d294ea47e39503d3
x_transferred
https://git.kernel.org/stable/c/70fac8088cfad9f3b379c9082832b4d7532c16c2
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found