{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2021-47455","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-05-21T14:58:30.833Z","datePublished":"2024-05-22T06:19:44.700Z","dateUpdated":"2025-11-03T17:30:57.924Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-08-28T14:42:34.474Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nptp: Fix possible memory leak in ptp_clock_register()\n\nI got memory leak as follows when doing fault injection test:\n\nunreferenced object 0xffff88800906c618 (size 8):\n  comm \"i2c-idt82p33931\", pid 4421, jiffies 4294948083 (age 13.188s)\n  hex dump (first 8 bytes):\n    70 74 70 30 00 00 00 00                          ptp0....\n  backtrace:\n    [<00000000312ed458>] __kmalloc_track_caller+0x19f/0x3a0\n    [<0000000079f6e2ff>] kvasprintf+0xb5/0x150\n    [<0000000026aae54f>] kvasprintf_const+0x60/0x190\n    [<00000000f323a5f7>] kobject_set_name_vargs+0x56/0x150\n    [<000000004e35abdd>] dev_set_name+0xc0/0x100\n    [<00000000f20cfe25>] ptp_clock_register+0x9f4/0xd30 [ptp]\n    [<000000008bb9f0de>] idt82p33_probe.cold+0x8b6/0x1561 [ptp_idt82p33]\n\nWhen posix_clock_register() returns an error, the name allocated\nin dev_set_name() will be leaked, the put_device() should be used\nto give up the device reference, then the name will be freed in\nkobject_cleanup() and other memory will be freed in ptp_clock_release()."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/ptp/ptp_clock.c"],"versions":[{"version":"a33121e5487b424339636b25c35d3a180eaa5f5e","lessThan":"f1c96d8085588e1b997a96214b409ac3be20b524","status":"affected","versionType":"git"},{"version":"a33121e5487b424339636b25c35d3a180eaa5f5e","lessThan":"95c0a0c5ec8839f8f21672be786e87a100319ca8","status":"affected","versionType":"git"},{"version":"a33121e5487b424339636b25c35d3a180eaa5f5e","lessThan":"4225fea1cb28370086e17e82c0f69bec2779dca0","status":"affected","versionType":"git"},{"version":"5230ef61882d2d14deb846eb6b48370694816e4c","status":"affected","versionType":"git"},{"version":"6f5e3bb7879ee1eb71c6c3cbaaffbb0da6cd7d57","status":"affected","versionType":"git"},{"version":"89e8fc989feaac00bf1a7f9a766289422e2f5768","status":"affected","versionType":"git"},{"version":"2dece4d6d13fe179ee3a5991811712725a56e2f7","status":"affected","versionType":"git"},{"version":"0393b8720128d5b39db8523e5bfbfc689f18c37c","status":"affected","versionType":"git"},{"version":"bfa2e0cd3dfda64fde43c3dca3aeba298d2fe7ad","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/ptp/ptp_clock.c"],"versions":[{"version":"5.5","status":"affected"},{"version":"0","lessThan":"5.5","status":"unaffected","versionType":"semver"},{"version":"5.10.241","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.14.15","lessThanOrEqual":"5.14.*","status":"unaffected","versionType":"semver"},{"version":"5.15","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.10.241"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.14.15"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.15"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.16.83"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4.224"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9.224"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.14.162"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19.93"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.8"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/f1c96d8085588e1b997a96214b409ac3be20b524"},{"url":"https://git.kernel.org/stable/c/95c0a0c5ec8839f8f21672be786e87a100319ca8"},{"url":"https://git.kernel.org/stable/c/4225fea1cb28370086e17e82c0f69bec2779dca0"}],"title":"ptp: Fix possible memory leak in ptp_clock_register()","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-06-10T18:55:42.625337Z","id":"CVE-2021-47455","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-10T18:55:51.518Z"}},{"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/95c0a0c5ec8839f8f21672be786e87a100319ca8","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/4225fea1cb28370086e17e82c0f69bec2779dca0","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T17:30:57.924Z"}}]}}