CVE-2021-47294

In the Linux kernel, the following vulnerability has been resolved: netrom: Decrease sock refcount when sock timers expire Commit 63346650c1a9 ("netrom: switch to sock timer API") switched to use sock timer API. It replaces mod_timer() by sk_reset_timer(), and del_timer() by sk_stop_timer(). Function sk_reset_timer() will increase the refcount of sock if it is called on an inactive timer, hence, in case the timer expires, we need to decrease the refcount ourselves in the handler, otherwise, the sock refcount will be unbalanced and the sock will never be freed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.18.134:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.20.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*

History

23 Jun 2025, 20:19

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.20.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.18.134:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/25df44e90ff5959b5c24ad361b648504a7e39ef3 - () https://git.kernel.org/stable/c/25df44e90ff5959b5c24ad361b648504a7e39ef3 - Patch
References () https://git.kernel.org/stable/c/48866fd5c361ea417ed24b43fc2a7dc2f5b060ef - () https://git.kernel.org/stable/c/48866fd5c361ea417ed24b43fc2a7dc2f5b060ef - Patch
References () https://git.kernel.org/stable/c/517a16b1a88bdb6b530f48d5d153478b2552d9a8 - () https://git.kernel.org/stable/c/517a16b1a88bdb6b530f48d5d153478b2552d9a8 - Patch
References () https://git.kernel.org/stable/c/6811744bd0efb9e472cb15d066cdb460beb8cb8a - () https://git.kernel.org/stable/c/6811744bd0efb9e472cb15d066cdb460beb8cb8a - Patch
References () https://git.kernel.org/stable/c/853262355518cd1247515b74e83fabf038aa6c29 - () https://git.kernel.org/stable/c/853262355518cd1247515b74e83fabf038aa6c29 - Patch
References () https://git.kernel.org/stable/c/9619cc7d97c3aa8ed3cfd2b8678b74fb6d6c7950 - () https://git.kernel.org/stable/c/9619cc7d97c3aa8ed3cfd2b8678b74fb6d6c7950 - Patch
References () https://git.kernel.org/stable/c/a01634bf91f2b6c42583770eb6815fb6d1e251cf - () https://git.kernel.org/stable/c/a01634bf91f2b6c42583770eb6815fb6d1e251cf - Patch
References () https://git.kernel.org/stable/c/bc1660206c3723c37ed4d622ad81781f1e987250 - () https://git.kernel.org/stable/c/bc1660206c3723c37ed4d622ad81781f1e987250 - Patch
CWE CWE-672

Information

Published : 2024-05-21 15:15

Updated : 2025-06-23 20:19


NVD link : CVE-2021-47294

Mitre link : CVE-2021-47294

CVE.ORG link : CVE-2021-47294


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-672

Operation on a Resource after Expiration or Release