First published: Tue May 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ipack: ipoctal: fix module reference leak A reference to the carrier module was taken on every open but was only released once when the final reference to the tty struct was dropped. Fix this by taking the module reference and initialising the tty driver data when installing the tty.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=3.18<4.4.286 | |
Linux Kernel | >=4.5<4.9.285 | |
Linux Kernel | >=4.10<4.14.249 | |
Linux Kernel | >=4.15<4.19.209 | |
Linux Kernel | >=4.20<5.4.151 | |
Linux Kernel | >=5.5<5.10.71 | |
Linux Kernel | >=5.11<5.14.10 | |
Linux Kernel | =5.15-rc1 | |
Linux Kernel | =5.15-rc2 | |
Linux Kernel | =5.15-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47403 has been classified as a moderate severity vulnerability affecting certain versions of the Linux kernel.
To fix CVE-2021-47403, update your Linux kernel to a version that includes the patches addressing this vulnerability.
CVE-2021-47403 affects multiple versions of the Linux kernel, specifically versions between 3.18 and 5.15-rc3.
CVE-2021-47403 is a reference leak vulnerability in the ipack and ipoctal modules of the Linux kernel.
Exploitation of CVE-2021-47403 could lead to a denial of service due to resource leaks, impacting system stability.