In the Linux kernel, the following vulnerability has been resolved:
ipack: ipoctal: fix module reference leak
A reference to the carrier module was taken on every open but was only
released once when the final reference to the tty struct was dropped.
Fix this by taking the module reference and initialising the tty driver
data when installing the tty.
References
Configurations
Configuration 1 (hide)
|
History
02 Apr 2025, 14:52
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/31398849b84ebae0d43a1cf379cb9895597f221a - Patch | |
References | () https://git.kernel.org/stable/c/3253c87e1e5bc0107aab773af2f135ebccf38666 - Patch | |
References | () https://git.kernel.org/stable/c/7cea848678470daadbfdaa6a112b823c290f900c - Patch | |
References | () https://git.kernel.org/stable/c/811178f296b16af30264def74c8d2179a72d5562 - Patch | |
References | () https://git.kernel.org/stable/c/9c5b77a7ffc983b2429ce158b50497c5d3c86a69 - Patch | |
References | () https://git.kernel.org/stable/c/bb8a4fcb2136508224c596a7e665bdba1d7c3c27 - Patch | |
References | () https://git.kernel.org/stable/c/c0adb5a947dec6cff7050ec56d78ecd3916f9ce6 - Patch | |
References | () https://git.kernel.org/stable/c/dde4c1429b97383689f755ce92b4ed1e84a9c92b - Patch | |
First Time |
Linux linux Kernel
Linux |
Information
Published : 2024-05-21 15:15
Updated : 2025-04-02 14:52
NVD link : CVE-2021-47403
Mitre link : CVE-2021-47403
CVE.ORG link : CVE-2021-47403
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor