{"id":"CVE-2021-47455","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nptp: Fix possible memory leak in ptp_clock_register()\n\nI got memory leak as follows when doing fault injection test:\n\nunreferenced object 0xffff88800906c618 (size 8):\n  comm \"i2c-idt82p33931\", pid 4421, jiffies 4294948083 (age 13.188s)\n  hex dump (first 8 bytes):\n    70 74 70 30 00 00 00 00                          ptp0....\n  backtrace:\n    [\u003c00000000312ed458\u003e] __kmalloc_track_caller+0x19f/0x3a0\n    [\u003c0000000079f6e2ff\u003e] kvasprintf+0xb5/0x150\n    [\u003c0000000026aae54f\u003e] kvasprintf_const+0x60/0x190\n    [\u003c00000000f323a5f7\u003e] kobject_set_name_vargs+0x56/0x150\n    [\u003c000000004e35abdd\u003e] dev_set_name+0xc0/0x100\n    [\u003c00000000f20cfe25\u003e] ptp_clock_register+0x9f4/0xd30 [ptp]\n    [\u003c000000008bb9f0de\u003e] idt82p33_probe.cold+0x8b6/0x1561 [ptp_idt82p33]\n\nWhen posix_clock_register() returns an error, the name allocated\nin dev_set_name() will be leaked, the put_device() should be used\nto give up the device reference, then the name will be freed in\nkobject_cleanup() and other memory will be freed in ptp_clock_release().","modified":"2026-03-13T05:20:46.668583Z","published":"2024-05-22T07:15:10.530Z","related":["ALSA-2024:7000","ALSA-2024:7001","SUSE-SU-2024:2008-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2189-1","SUSE-SU-2024:2190-1","SUSE-SU-2025:02334-1"],"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/f1c96d8085588e1b997a96214b409ac3be20b524"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"},{"type":"FIX","url":"https://git.kernel.org/stable/c/4225fea1cb28370086e17e82c0f69bec2779dca0"},{"type":"FIX","url":"https://git.kernel.org/stable/c/95c0a0c5ec8839f8f21672be786e87a100319ca8"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-47455.json","unresolved_ranges":[{"events":[{"introduced":"3.16.83"},{"fixed":"3.17"}]},{"events":[{"introduced":"4.4.224"},{"fixed":"4.5"}]},{"events":[{"introduced":"4.9.224"},{"fixed":"4.10"}]},{"events":[{"introduced":"4.14.162"},{"fixed":"4.15"}]},{"events":[{"introduced":"4.19.93"},{"fixed":"4.20"}]},{"events":[{"introduced":"5.4.8"},{"fixed":"5.14.15"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc4"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc5"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc6"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}