CVE-2021-47294

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/05/2024
Last modified:
23/06/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netrom: Decrease sock refcount when sock timers expire<br /> <br /> Commit 63346650c1a9 ("netrom: switch to sock timer API") switched to use<br /> sock timer API. It replaces mod_timer() by sk_reset_timer(), and<br /> del_timer() by sk_stop_timer().<br /> <br /> Function sk_reset_timer() will increase the refcount of sock if it is<br /> called on an inactive timer, hence, in case the timer expires, we need to<br /> decrease the refcount ourselves in the handler, otherwise, the sock<br /> refcount will be unbalanced and the sock will never be freed.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.4.173 (including) 4.4.277 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.9.155 (including) 4.9.277 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.14.98 (including) 4.14.241 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.19.20 (including) 4.19.199 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.0 (including) 5.4.136 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.54 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.13.6 (excluding)
cpe:2.3:o:linux:linux_kernel:3.18.134:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.20.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*