CVE-2021-47431

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix gart.bo pin_count leak gmc_v{9,10}_0_gart_disable() isn't called matched with correspoding gart_enbale function in SRIOV case. This will lead to gart.bo pin_count leak on driver unload.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*

History

23 Sep 2025, 20:25

Type Values Removed Values Added
CWE NVD-CWE-Other
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/18d1c5ea3798ba42cfa0f8b2264d873463facb03 - () https://git.kernel.org/stable/c/18d1c5ea3798ba42cfa0f8b2264d873463facb03 - Patch
References () https://git.kernel.org/stable/c/621ddffb70db824eabd63d18ac635180fe9500f9 - () https://git.kernel.org/stable/c/621ddffb70db824eabd63d18ac635180fe9500f9 - Patch
References () https://git.kernel.org/stable/c/66805763a97f8f7bdf742fc0851d85c02ed9411f - () https://git.kernel.org/stable/c/66805763a97f8f7bdf742fc0851d85c02ed9411f - Patch
References () https://git.kernel.org/stable/c/83d857d6b0967b6709cd38750c3ce2ed8ced1a95 - () https://git.kernel.org/stable/c/83d857d6b0967b6709cd38750c3ce2ed8ced1a95 - Patch

Information

Published : 2024-05-21 15:15

Updated : 2025-09-23 20:25


NVD link : CVE-2021-47431

Mitre link : CVE-2021-47431

CVE.ORG link : CVE-2021-47431


JSON object : View

Products Affected

linux

  • linux_kernel