gsd-2021-47104
Vulnerability from gsd
Modified
2024-03-05 06:03
Details
In the Linux kernel, the following vulnerability has been resolved: IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() The wrong goto label was used for the error case and missed cleanup of the pkt allocation. Addresses-Coverity-ID: 1493352 ("Resource leak")
Aliases



{
   gsd: {
      metadata: {
         exploitCode: "unknown",
         remediation: "unknown",
         reportConfidence: "confirmed",
         type: "vulnerability",
      },
      osvSchema: {
         aliases: [
            "CVE-2021-47104",
         ],
         details: "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/qib: Fix memory leak in qib_user_sdma_queue_pkts()\n\nThe wrong goto label was used for the error case and missed cleanup of the\npkt allocation.\n\nAddresses-Coverity-ID: 1493352 (\"Resource leak\")",
         id: "GSD-2021-47104",
         modified: "2024-03-05T06:03:55.169009Z",
         schema_version: "1.4.0",
      },
   },
   namespaces: {
      "cve.org": {
         CVE_data_meta: {
            ASSIGNER: "cve@kernel.org",
            ID: "CVE-2021-47104",
            STATE: "PUBLIC",
         },
         affects: {
            vendor: {
               vendor_data: [
                  {
                     product: {
                        product_data: [
                           {
                              product_name: "Linux",
                              version: {
                                 version_data: [
                                    {
                                       version_affected: "<",
                                       version_name: "bda41654b6e0",
                                       version_value: "1ced0a3015a9",
                                    },
                                    {
                                       version_affected: "<",
                                       version_name: "3f57c3f67fd9",
                                       version_value: "76b648063eb3",
                                    },
                                    {
                                       version_affected: "<",
                                       version_name: "60833707b968",
                                       version_value: "d53456492b5d",
                                    },
                                    {
                                       version_affected: "<",
                                       version_name: "73d2892148aa",
                                       version_value: "0aaec9c5f607",
                                    },
                                    {
                                       version_affected: "<",
                                       version_name: "0f8cdfff0682",
                                       version_value: "79dcbd817615",
                                    },
                                    {
                                       version_affected: "<",
                                       version_name: "c3e17e58f571",
                                       version_value: "7cf6466e00a7",
                                    },
                                    {
                                       version_affected: "<",
                                       version_name: "d39bf40e55e6",
                                       version_value: "aefcc25f3a0c",
                                    },
                                    {
                                       version_value: "not down converted",
                                       x_cve_json_5_version_data: {
                                          defaultStatus: "affected",
                                          versions: [
                                             {
                                                status: "affected",
                                                version: "5.15",
                                             },
                                             {
                                                lessThan: "5.15",
                                                status: "unaffected",
                                                version: "0",
                                                versionType: "custom",
                                             },
                                             {
                                                lessThanOrEqual: "4.4.*",
                                                status: "unaffected",
                                                version: "4.4.297",
                                                versionType: "custom",
                                             },
                                             {
                                                lessThanOrEqual: "4.9.*",
                                                status: "unaffected",
                                                version: "4.9.295",
                                                versionType: "custom",
                                             },
                                             {
                                                lessThanOrEqual: "4.14.*",
                                                status: "unaffected",
                                                version: "4.14.260",
                                                versionType: "custom",
                                             },
                                             {
                                                lessThanOrEqual: "4.19.*",
                                                status: "unaffected",
                                                version: "4.19.223",
                                                versionType: "custom",
                                             },
                                             {
                                                lessThanOrEqual: "5.4.*",
                                                status: "unaffected",
                                                version: "5.4.169",
                                                versionType: "custom",
                                             },
                                             {
                                                lessThanOrEqual: "5.10.*",
                                                status: "unaffected",
                                                version: "5.10.89",
                                                versionType: "custom",
                                             },
                                             {
                                                lessThanOrEqual: "5.15.*",
                                                status: "unaffected",
                                                version: "5.15.12",
                                                versionType: "custom",
                                             },
                                             {
                                                lessThanOrEqual: "*",
                                                status: "unaffected",
                                                version: "5.16",
                                                versionType: "original_commit_for_fix",
                                             },
                                          ],
                                       },
                                    },
                                 ],
                              },
                           },
                        ],
                     },
                     vendor_name: "Linux",
                  },
               ],
            },
         },
         data_format: "MITRE",
         data_type: "CVE",
         data_version: "4.0",
         description: {
            description_data: [
               {
                  lang: "eng",
                  value: "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/qib: Fix memory leak in qib_user_sdma_queue_pkts()\n\nThe wrong goto label was used for the error case and missed cleanup of the\npkt allocation.\n\nAddresses-Coverity-ID: 1493352 (\"Resource leak\")",
               },
            ],
         },
         generator: {
            engine: "bippy-851b3ed3d212",
         },
         problemtype: {
            problemtype_data: [
               {
                  description: [
                     {
                        lang: "eng",
                        value: "n/a",
                     },
                  ],
               },
            ],
         },
         references: {
            reference_data: [
               {
                  name: "https://git.kernel.org/stable/c/1ced0a3015a95c6a6db45e37250912c4c86697ab",
                  refsource: "MISC",
                  url: "https://git.kernel.org/stable/c/1ced0a3015a95c6a6db45e37250912c4c86697ab",
               },
               {
                  name: "https://git.kernel.org/stable/c/76b648063eb36c72dfc0a6896de8a0a7d2c7841c",
                  refsource: "MISC",
                  url: "https://git.kernel.org/stable/c/76b648063eb36c72dfc0a6896de8a0a7d2c7841c",
               },
               {
                  name: "https://git.kernel.org/stable/c/d53456492b5d02033c73dfa0f3b94c86337791ba",
                  refsource: "MISC",
                  url: "https://git.kernel.org/stable/c/d53456492b5d02033c73dfa0f3b94c86337791ba",
               },
               {
                  name: "https://git.kernel.org/stable/c/0aaec9c5f60754b56f84460ea439b8c5e91f4caa",
                  refsource: "MISC",
                  url: "https://git.kernel.org/stable/c/0aaec9c5f60754b56f84460ea439b8c5e91f4caa",
               },
               {
                  name: "https://git.kernel.org/stable/c/79dcbd8176152b860028b62f81a635d987365752",
                  refsource: "MISC",
                  url: "https://git.kernel.org/stable/c/79dcbd8176152b860028b62f81a635d987365752",
               },
               {
                  name: "https://git.kernel.org/stable/c/7cf6466e00a77b0a914b7b2c28a1fc7947d55e59",
                  refsource: "MISC",
                  url: "https://git.kernel.org/stable/c/7cf6466e00a77b0a914b7b2c28a1fc7947d55e59",
               },
               {
                  name: "https://git.kernel.org/stable/c/aefcc25f3a0cd28a87d11d41d30419a12cd26a34",
                  refsource: "MISC",
                  url: "https://git.kernel.org/stable/c/aefcc25f3a0cd28a87d11d41d30419a12cd26a34",
               },
               {
                  name: "https://git.kernel.org/stable/c/bee90911e0138c76ee67458ac0d58b38a3190f65",
                  refsource: "MISC",
                  url: "https://git.kernel.org/stable/c/bee90911e0138c76ee67458ac0d58b38a3190f65",
               },
            ],
         },
      },
      "nvd.nist.gov": {
         cve: {
            descriptions: [
               {
                  lang: "en",
                  value: "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/qib: Fix memory leak in qib_user_sdma_queue_pkts()\n\nThe wrong goto label was used for the error case and missed cleanup of the\npkt allocation.\n\nAddresses-Coverity-ID: 1493352 (\"Resource leak\")",
               },
            ],
            id: "CVE-2021-47104",
            lastModified: "2024-03-05T13:41:01.900",
            metrics: {},
            published: "2024-03-04T19:15:18.643",
            references: [
               {
                  source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
                  url: "https://git.kernel.org/stable/c/0aaec9c5f60754b56f84460ea439b8c5e91f4caa",
               },
               {
                  source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
                  url: "https://git.kernel.org/stable/c/1ced0a3015a95c6a6db45e37250912c4c86697ab",
               },
               {
                  source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
                  url: "https://git.kernel.org/stable/c/76b648063eb36c72dfc0a6896de8a0a7d2c7841c",
               },
               {
                  source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
                  url: "https://git.kernel.org/stable/c/79dcbd8176152b860028b62f81a635d987365752",
               },
               {
                  source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
                  url: "https://git.kernel.org/stable/c/7cf6466e00a77b0a914b7b2c28a1fc7947d55e59",
               },
               {
                  source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
                  url: "https://git.kernel.org/stable/c/aefcc25f3a0cd28a87d11d41d30419a12cd26a34",
               },
               {
                  source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
                  url: "https://git.kernel.org/stable/c/bee90911e0138c76ee67458ac0d58b38a3190f65",
               },
               {
                  source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
                  url: "https://git.kernel.org/stable/c/d53456492b5d02033c73dfa0f3b94c86337791ba",
               },
            ],
            sourceIdentifier: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            vulnStatus: "Awaiting Analysis",
         },
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.