{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T04:56:02.839","vulnerabilities":[{"cve":{"id":"CVE-2021-47455","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2024-05-22T07:15:10.530","lastModified":"2025-11-03T18:15:39.480","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nptp: Fix possible memory leak in ptp_clock_register()\n\nI got memory leak as follows when doing fault injection test:\n\nunreferenced object 0xffff88800906c618 (size 8):\n  comm \"i2c-idt82p33931\", pid 4421, jiffies 4294948083 (age 13.188s)\n  hex dump (first 8 bytes):\n    70 74 70 30 00 00 00 00                          ptp0....\n  backtrace:\n    [<00000000312ed458>] __kmalloc_track_caller+0x19f/0x3a0\n    [<0000000079f6e2ff>] kvasprintf+0xb5/0x150\n    [<0000000026aae54f>] kvasprintf_const+0x60/0x190\n    [<00000000f323a5f7>] kobject_set_name_vargs+0x56/0x150\n    [<000000004e35abdd>] dev_set_name+0xc0/0x100\n    [<00000000f20cfe25>] ptp_clock_register+0x9f4/0xd30 [ptp]\n    [<000000008bb9f0de>] idt82p33_probe.cold+0x8b6/0x1561 [ptp_idt82p33]\n\nWhen posix_clock_register() returns an error, the name allocated\nin dev_set_name() will be leaked, the put_device() should be used\nto give up the device reference, then the name will be freed in\nkobject_cleanup() and other memory will be freed in ptp_clock_release()."},{"lang":"es","value":"En el kernel de Linux, se resolvió la siguiente vulnerabilidad: ptp: solucione una posible pérdida de memoria en ptp_clock_register() Obtuve una pérdida de memoria de la siguiente manera al realizar la prueba de inyección de fallas: objeto sin referencia 0xffff88800906c618 (tamaño 8): comm \"i2c-idt82p33931\", pid 4421, jiffies 4294948083 (edad 13,188 s) volcado hexadecimal (primeros 8 bytes): 70 74 70 30 00 00 00 00 ptp0.... backtrace: [&lt;00000000312ed458&gt;] __kmalloc_track_caller+0x19f/0x3a0 [&lt;0000 000079f6e2ff&gt;] kvasprintf+0xb5 /0x150 [&lt;0000000026aae54f&gt;] kvasprintf_const+0x60/0x190 [&lt;00000000f323a5f7&gt;] kobject_set_name_vargs+0x56/0x150 [&lt;000000004e35abdd&gt;] dev_set_name+0xc0/0x100 0000000f20cfe25&gt;] ptp_clock_register+0x9f4/0xd30 [ptp] [&lt;000000008bb9f0de&gt;] idt82p33_probe.cold+0x8b6/0x1561 [ptp_idt82p33] Cuando posix_clock_register() devuelve un error, el nombre asignado en dev_set_name() se filtrará, se debe usar put_device() para renunciar a la referencia del dispositivo, luego el nombre se liberará kobject_cleanup() y otra memoria se liberarán en ptp_clock_release()."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-401"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.16.83","versionEndExcluding":"3.17","matchCriteriaId":"757FC3F8-D35F-4A41-B2EE-FB159111EF5D"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4.224","versionEndExcluding":"4.5","matchCriteriaId":"9ADA9CD5-A6CD-490F-A93C-4E5C4CEA8414"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9.224","versionEndExcluding":"4.10","matchCriteriaId":"D0E0A17F-F59E-41B5-82D3-6A187EC99B69"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.14.162","versionEndExcluding":"4.15","matchCriteriaId":"D8E34938-B599-4B3F-9871-2341E248D9A4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19.93","versionEndExcluding":"4.20","matchCriteriaId":"D83D88FB-206E-466D-BC71-94C228C5C9E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.8","versionEndExcluding":"5.14.15","matchCriteriaId":"0B5E1919-20BB-4670-82D1-34EEBD95C3D9"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*","matchCriteriaId":"E46C74C6-B76B-4C94-A6A4-FD2FFF62D644"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*","matchCriteriaId":"60134C3A-06E4-48C1-B04F-2903732A4E56"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*","matchCriteriaId":"0460DA88-8FE1-46A2-9DDA-1F1ABA552E71"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*","matchCriteriaId":"AF55383D-4DF2-45DC-93F7-571F4F978EAB"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*","matchCriteriaId":"9E9481B2-8AA6-4CBD-B5D3-C10F51FF6D01"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*","matchCriteriaId":"EBD45831-4B79-42BC-ABC0-86870F0DEA89"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/4225fea1cb28370086e17e82c0f69bec2779dca0","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/95c0a0c5ec8839f8f21672be786e87a100319ca8","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/f1c96d8085588e1b997a96214b409ac3be20b524","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/4225fea1cb28370086e17e82c0f69bec2779dca0","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/95c0a0c5ec8839f8f21672be786e87a100319ca8","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}