{"id":"CVE-2021-47403","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nipack: ipoctal: fix module reference leak\n\nA reference to the carrier module was taken on every open but was only\nreleased once when the final reference to the tty struct was dropped.\n\nFix this by taking the module reference and initialising the tty driver\ndata when installing the tty.","modified":"2026-03-15T22:43:12.682141Z","published":"2024-05-21T15:15:25.803Z","related":["SUSE-SU-2024:2008-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2189-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2892-1","SUSE-SU-2024:2901-1","SUSE-SU-2024:2940-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/7cea848678470daadbfdaa6a112b823c290f900c"},{"type":"FIX","url":"https://git.kernel.org/stable/c/811178f296b16af30264def74c8d2179a72d5562"},{"type":"FIX","url":"https://git.kernel.org/stable/c/9c5b77a7ffc983b2429ce158b50497c5d3c86a69"},{"type":"FIX","url":"https://git.kernel.org/stable/c/bb8a4fcb2136508224c596a7e665bdba1d7c3c27"},{"type":"FIX","url":"https://git.kernel.org/stable/c/c0adb5a947dec6cff7050ec56d78ecd3916f9ce6"},{"type":"FIX","url":"https://git.kernel.org/stable/c/dde4c1429b97383689f755ce92b4ed1e84a9c92b"},{"type":"FIX","url":"https://git.kernel.org/stable/c/31398849b84ebae0d43a1cf379cb9895597f221a"},{"type":"FIX","url":"https://git.kernel.org/stable/c/3253c87e1e5bc0107aab773af2f135ebccf38666"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47403.json","unresolved_ranges":[{"events":[{"introduced":"3.18"},{"fixed":"4.4.286"}]},{"events":[{"introduced":"4.5"},{"fixed":"4.9.285"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.14.249"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.209"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.151"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.71"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.14.10"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc3"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}]}