In the Linux kernel, the following vulnerability has been resolved:
netrom: Decrease sock refcount when sock timers expire
Commit 63346650c1a9 ("netrom: switch to sock timer API") switched to use
sock timer API. It replaces mod_timer() by sk_reset_timer(), and
del_timer() by sk_stop_timer().
Function sk_reset_timer() will increase the refcount of sock if it is
called on an inactive timer, hence, in case the timer expires, we need to
decrease the refcount ourselves in the handler, otherwise, the sock
refcount will be unbalanced and the sock will never be freed.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-05-21T14:35:18.034Z
Updated: 2024-08-04T05:32:08.527Z
Reserved: 2024-05-21T13:27:52.130Z
Link: CVE-2021-47294
Vulnrichment
Updated: 2024-08-04T05:32:08.527Z
NVD
Status : Awaiting Analysis
Published: 2024-05-21T15:15:17.323
Modified: 2024-05-21T16:54:26.047
Link: CVE-2021-47294
Redhat