CVE-2021-47403

In the Linux kernel, the following vulnerability has been resolved: ipack: ipoctal: fix module reference leak A reference to the carrier module was taken on every open but was only released once when the final reference to the tty struct was dropped. Fix this by taking the module reference and initialising the tty driver data when installing the tty.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*

History

02 Apr 2025, 14:52

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/31398849b84ebae0d43a1cf379cb9895597f221a - () https://git.kernel.org/stable/c/31398849b84ebae0d43a1cf379cb9895597f221a - Patch
References () https://git.kernel.org/stable/c/3253c87e1e5bc0107aab773af2f135ebccf38666 - () https://git.kernel.org/stable/c/3253c87e1e5bc0107aab773af2f135ebccf38666 - Patch
References () https://git.kernel.org/stable/c/7cea848678470daadbfdaa6a112b823c290f900c - () https://git.kernel.org/stable/c/7cea848678470daadbfdaa6a112b823c290f900c - Patch
References () https://git.kernel.org/stable/c/811178f296b16af30264def74c8d2179a72d5562 - () https://git.kernel.org/stable/c/811178f296b16af30264def74c8d2179a72d5562 - Patch
References () https://git.kernel.org/stable/c/9c5b77a7ffc983b2429ce158b50497c5d3c86a69 - () https://git.kernel.org/stable/c/9c5b77a7ffc983b2429ce158b50497c5d3c86a69 - Patch
References () https://git.kernel.org/stable/c/bb8a4fcb2136508224c596a7e665bdba1d7c3c27 - () https://git.kernel.org/stable/c/bb8a4fcb2136508224c596a7e665bdba1d7c3c27 - Patch
References () https://git.kernel.org/stable/c/c0adb5a947dec6cff7050ec56d78ecd3916f9ce6 - () https://git.kernel.org/stable/c/c0adb5a947dec6cff7050ec56d78ecd3916f9ce6 - Patch
References () https://git.kernel.org/stable/c/dde4c1429b97383689f755ce92b4ed1e84a9c92b - () https://git.kernel.org/stable/c/dde4c1429b97383689f755ce92b4ed1e84a9c92b - Patch
First Time Linux linux Kernel
Linux

Information

Published : 2024-05-21 15:15

Updated : 2025-04-02 14:52


NVD link : CVE-2021-47403

Mitre link : CVE-2021-47403

CVE.ORG link : CVE-2021-47403


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor