{"id":"CVE-2021-47330","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ntty: serial: 8250: serial_cs: Fix a memory leak in error handling path\n\nIn the probe function, if the final 'serial_config()' fails, 'info' is\nleaking.\n\nAdd a resource handling path to free this memory.","modified":"2026-03-13T05:20:42.034309Z","published":"2024-05-21T15:15:19.977Z","related":["SUSE-SU-2024:1979-1","SUSE-SU-2024:1983-1","SUSE-SU-2024:2010-1","SUSE-SU-2024:2183-1","SUSE-SU-2024:2184-1","SUSE-SU-2024:2185-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/b2ef1f5de40342de44fc5355321595f91774dab5"},{"type":"FIX","url":"https://git.kernel.org/stable/c/cddee5c287e26f6b2ba5c0ffdfc3a846f2f10461"},{"type":"FIX","url":"https://git.kernel.org/stable/c/fad92b11047a748c996ebd6cfb164a63814eeb2e"},{"type":"FIX","url":"https://git.kernel.org/stable/c/331f5923fce4f45b8170ccf06c529e8eb28f37bc"},{"type":"FIX","url":"https://git.kernel.org/stable/c/34f4590f5ec9859ea9136249f528173d150bd584"},{"type":"FIX","url":"https://git.kernel.org/stable/c/7a80f71601af015856a0aeb1e3c294037ac3dd32"},{"type":"FIX","url":"https://git.kernel.org/stable/c/b5a2799cd62ed30c81b22c23028d9ee374e2138c"},{"type":"FIX","url":"https://git.kernel.org/stable/c/c39cf4df19acf0133fa284a8cd83fad42cd13cc2"},{"type":"FIX","url":"https://git.kernel.org/stable/c/ee16bed959862a6de2913f71a04cb563d7237b67"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.276"}]},{"events":[{"introduced":"4.5"},{"fixed":"4.9.276"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.14.240"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.198"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.134"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.52"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.12.19"}]},{"events":[{"introduced":"5.13"},{"fixed":"5.13.4"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-47330.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}