First published: Tue Feb 27 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: s390/zcrypt: fix zcard and zqueue hot-unplug memleak Tests with kvm and a kmemdebug kernel showed, that on hot unplug the zcard and zqueue structs for the unplugged card or queue are not properly freed because of a mismatch with get/put for the embedded kref counter. This fix now adjusts the handling of the kref counters. With init the kref counter starts with 1. This initial value needs to drop to zero with the unregister of the card or queue to trigger the release and free the object.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | >=5.10<5.10.36 | |
Linux kernel | >=5.11<5.11.20 | |
Linux kernel | >=5.12<5.12.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-46968 has been classified as a moderate severity vulnerability in the Linux kernel.
To fix CVE-2021-46968, you should upgrade your Linux kernel to the latest version that is not affected by this vulnerability.
CVE-2021-46968 affects the Linux kernel versions 5.10 to 5.10.36, 5.11 to 5.11.20, and 5.12 to 5.12.3.
The consequence of CVE-2021-46968 can lead to memory leaks during the hot unplug process of zcard and zqueue in the Linux kernel.
There are currently no specific workarounds for CVE-2021-46968 other than updating to a patched version of the Linux kernel.