CVE-2021-47431

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix gart.bo pin_count leak gmc_v{9,10}_0_gart_disable() isn't called matched with correspoding gart_enbale function in SRIOV case. This will lead to gart.bo pin_count leak on driver unload.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*

History

23 Sep 2025, 20:25

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/18d1c5ea3798ba42cfa0f8b2264d873463facb03 - () https://git.kernel.org/stable/c/18d1c5ea3798ba42cfa0f8b2264d873463facb03 - Patch
References () https://git.kernel.org/stable/c/621ddffb70db824eabd63d18ac635180fe9500f9 - () https://git.kernel.org/stable/c/621ddffb70db824eabd63d18ac635180fe9500f9 - Patch
References () https://git.kernel.org/stable/c/66805763a97f8f7bdf742fc0851d85c02ed9411f - () https://git.kernel.org/stable/c/66805763a97f8f7bdf742fc0851d85c02ed9411f - Patch
References () https://git.kernel.org/stable/c/83d857d6b0967b6709cd38750c3ce2ed8ced1a95 - () https://git.kernel.org/stable/c/83d857d6b0967b6709cd38750c3ce2ed8ced1a95 - Patch
CPE cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-Other
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

21 Nov 2024, 06:36

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: drm/amdgpu: corrige la fuga de pin_count de gart.bo gmc_v{9,10}_0_gart_disable() no se llama y coincide con la función gart_enbale correspondiente en el caso SRIOV. Esto provocará una pérdida de pin_count de gart.bo al descargar el controlador.
References () https://git.kernel.org/stable/c/18d1c5ea3798ba42cfa0f8b2264d873463facb03 - () https://git.kernel.org/stable/c/18d1c5ea3798ba42cfa0f8b2264d873463facb03 -
References () https://git.kernel.org/stable/c/621ddffb70db824eabd63d18ac635180fe9500f9 - () https://git.kernel.org/stable/c/621ddffb70db824eabd63d18ac635180fe9500f9 -
References () https://git.kernel.org/stable/c/66805763a97f8f7bdf742fc0851d85c02ed9411f - () https://git.kernel.org/stable/c/66805763a97f8f7bdf742fc0851d85c02ed9411f -
References () https://git.kernel.org/stable/c/83d857d6b0967b6709cd38750c3ce2ed8ced1a95 - () https://git.kernel.org/stable/c/83d857d6b0967b6709cd38750c3ce2ed8ced1a95 -

21 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 15:15

Updated : 2025-09-23 20:25


NVD link : CVE-2021-47431

Mitre link : CVE-2021-47431

CVE.ORG link : CVE-2021-47431


JSON object : View

Products Affected

linux

  • linux_kernel