In the Linux kernel, the following vulnerability has been resolved:
netrom: Decrease sock refcount when sock timers expire
Commit 63346650c1a9 ("netrom: switch to sock timer API") switched to use
sock timer API. It replaces mod_timer() by sk_reset_timer(), and
del_timer() by sk_stop_timer().
Function sk_reset_timer() will increase the refcount of sock if it is
called on an inactive timer, hence, in case the timer expires, we need to
decrease the refcount ourselves in the handler, otherwise, the sock
refcount will be unbalanced and the sock will never be freed.
References
Configurations
Configuration 1 (hide)
|
History
23 Jun 2025, 20:19
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-672 | |
CPE | cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.20.7:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.18.134:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/25df44e90ff5959b5c24ad361b648504a7e39ef3 - Patch | |
References | () https://git.kernel.org/stable/c/48866fd5c361ea417ed24b43fc2a7dc2f5b060ef - Patch | |
References | () https://git.kernel.org/stable/c/517a16b1a88bdb6b530f48d5d153478b2552d9a8 - Patch | |
References | () https://git.kernel.org/stable/c/6811744bd0efb9e472cb15d066cdb460beb8cb8a - Patch | |
References | () https://git.kernel.org/stable/c/853262355518cd1247515b74e83fabf038aa6c29 - Patch | |
References | () https://git.kernel.org/stable/c/9619cc7d97c3aa8ed3cfd2b8678b74fb6d6c7950 - Patch | |
References | () https://git.kernel.org/stable/c/a01634bf91f2b6c42583770eb6815fb6d1e251cf - Patch | |
References | () https://git.kernel.org/stable/c/bc1660206c3723c37ed4d622ad81781f1e987250 - Patch | |
First Time |
Linux linux Kernel
Linux |
21 Nov 2024, 06:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/25df44e90ff5959b5c24ad361b648504a7e39ef3 - | |
References | () https://git.kernel.org/stable/c/48866fd5c361ea417ed24b43fc2a7dc2f5b060ef - | |
References | () https://git.kernel.org/stable/c/517a16b1a88bdb6b530f48d5d153478b2552d9a8 - | |
References | () https://git.kernel.org/stable/c/6811744bd0efb9e472cb15d066cdb460beb8cb8a - | |
References | () https://git.kernel.org/stable/c/853262355518cd1247515b74e83fabf038aa6c29 - | |
References | () https://git.kernel.org/stable/c/9619cc7d97c3aa8ed3cfd2b8678b74fb6d6c7950 - | |
References | () https://git.kernel.org/stable/c/a01634bf91f2b6c42583770eb6815fb6d1e251cf - | |
References | () https://git.kernel.org/stable/c/bc1660206c3723c37ed4d622ad81781f1e987250 - | |
Summary |
|
21 May 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-21 15:15
Updated : 2025-06-23 20:19
NVD link : CVE-2021-47294
Mitre link : CVE-2021-47294
CVE.ORG link : CVE-2021-47294
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-672
Operation on a Resource after Expiration or Release