{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T17:47:27.198","vulnerabilities":[{"cve":{"id":"CVE-2021-46956","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2024-02-27T19:04:06.717","lastModified":"2024-12-06T17:54:34.117","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nvirtiofs: fix memory leak in virtio_fs_probe()\n\nWhen accidentally passing twice the same tag to qemu, kmemleak ended up\nreporting a memory leak in virtiofs.  Also, looking at the log I saw the\nfollowing error (that's when I realised the duplicated tag):\n\n  virtiofs: probe of virtio5 failed with error -17\n\nHere's the kmemleak log for reference:\n\nunreferenced object 0xffff888103d47800 (size 1024):\n  comm \"systemd-udevd\", pid 118, jiffies 4294893780 (age 18.340s)\n  hex dump (first 32 bytes):\n    00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00  .....N..........\n    ff ff ff ff ff ff ff ff 80 90 02 a0 ff ff ff ff  ................\n  backtrace:\n    [<000000000ebb87c1>] virtio_fs_probe+0x171/0x7ae [virtiofs]\n    [<00000000f8aca419>] virtio_dev_probe+0x15f/0x210\n    [<000000004d6baf3c>] really_probe+0xea/0x430\n    [<00000000a6ceeac8>] device_driver_attach+0xa8/0xb0\n    [<00000000196f47a7>] __driver_attach+0x98/0x140\n    [<000000000b20601d>] bus_for_each_dev+0x7b/0xc0\n    [<00000000399c7b7f>] bus_add_driver+0x11b/0x1f0\n    [<0000000032b09ba7>] driver_register+0x8f/0xe0\n    [<00000000cdd55998>] 0xffffffffa002c013\n    [<000000000ea196a2>] do_one_initcall+0x64/0x2e0\n    [<0000000008f727ce>] do_init_module+0x5c/0x260\n    [<000000003cdedab6>] __do_sys_finit_module+0xb5/0x120\n    [<00000000ad2f48c6>] do_syscall_64+0x33/0x40\n    [<00000000809526b5>] entry_SYSCALL_64_after_hwframe+0x44/0xae"},{"lang":"es","value":"En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: virtiofs: corrige pérdida de memoria en virtio_fs_probe() Al pasar accidentalmente dos veces la misma etiqueta a qemu, kmemleak terminó reportando una pérdida de memoria en virtiofs. Además, mirando el registro vi el siguiente error (fue entonces cuando me di cuenta de la etiqueta duplicada): virtiofs: la sonda de virtio5 falló con el error -17 Aquí está el registro kmemleak como referencia: objeto sin referencia 0xffff888103d47800 (tamaño 1024): comm \"systemd- udevd\", pid 118, jiffies 4294893780 (edad 18.340 s) volcado hexadecimal (primeros 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 ......N....... ... ff ff ff ff ff ff ff ff 80 90 02 a0 ff ff ff ff ................ rastreo: [&lt;000000000ebb87c1&gt;] virtio_fs_probe+0x171/0x7ae [virtiofs] [&lt;00000000f8aca419&gt;] virtio_dev_probe+0x15f/0x210 [&lt;000000004d6baf3c&gt;] very_probe+0xea/0x430 [&lt;00000000a6ceeac8&gt;] device_driver_attach+0xa8/0xb0 [&lt;00000000196f47a7 &gt;] __driver_attach+0x98/0x140 [&lt;000000000b20601d&gt;] bus_for_each_dev+0x7b/0xc0 [&lt;00000000399c7b7f&gt;] bus_add_driver+0x11b/0x1f0 [&lt;0000000032b09ba7&gt;] driver_register+0x8f/0xe0 [&lt;00000000cdd55998&gt;] 0xffffffffa002c013 [&lt;000000000ea196a2&gt; ] do_one_initcall+0x64/0x2e0 [&lt;0000000008f727ce&gt;] do_init_module+0x5c/0x260 [&lt;000000003cdedab6&gt; ] __do_sys_finit_module+0xb5/0x120 [&lt;00000000ad2f48c6&gt;] do_syscall_64+0x33/0x40 [&lt;00000000809526b5&gt;] Entry_SYSCALL_64_after_hwframe+0x44/0xae "}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-401"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"5.4.118","matchCriteriaId":"45C90F78-15A8-452F-AA7D-00A762FDEFE7"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.10.36","matchCriteriaId":"003E22D0-CA29-4338-8B35-0754C740074F"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11","versionEndExcluding":"5.11.20","matchCriteriaId":"EEC03413-9760-46D4-AC1D-EB084A1D4111"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.12","versionEndExcluding":"5.12.3","matchCriteriaId":"F9D6B2DE-7E4A-4B3B-9AEE-3A2C5F23DA32"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/310efc95c72c13faf855c692d19cd4d054d827c8","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/5116e79fc6e6725b8acdad8b7e928a83ab7b47e6","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/9b9d60c0eb8ada99cce2a9ab5c15dffc523b01ae","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/c79c5e0178922a9e092ec8fed026750f39dcaef4","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/d19555ff225d0896a33246a49279e6d578095f15","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/310efc95c72c13faf855c692d19cd4d054d827c8","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/5116e79fc6e6725b8acdad8b7e928a83ab7b47e6","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/9b9d60c0eb8ada99cce2a9ab5c15dffc523b01ae","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/c79c5e0178922a9e092ec8fed026750f39dcaef4","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/d19555ff225d0896a33246a49279e6d578095f15","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}}]}