5.5
CVE-2021-47294
- EPSS 0.02%
- Veröffentlicht 21.05.2024 15:15:17
- Zuletzt bearbeitet 23.06.2025 20:19:04
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved:
netrom: Decrease sock refcount when sock timers expire
Commit 63346650c1a9 ("netrom: switch to sock timer API") switched to use
sock timer API. It replaces mod_timer() by sk_reset_timer(), and
del_timer() by sk_stop_timer().
Function sk_reset_timer() will increase the refcount of sock if it is
called on an inactive timer, hence, in case the timer expires, we need to
decrease the refcount ourselves in the handler, otherwise, the sock
refcount will be unbalanced and the sock will never be freed.Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 4.4.173 < 4.4.277
Linux ≫ Linux Kernel Version >= 4.9.155 < 4.9.277
Linux ≫ Linux Kernel Version >= 4.14.98 < 4.14.241
Linux ≫ Linux Kernel Version >= 4.19.20 < 4.19.199
Linux ≫ Linux Kernel Version >= 5.0 < 5.4.136
Linux ≫ Linux Kernel Version >= 5.5 < 5.10.54
Linux ≫ Linux Kernel Version >= 5.11 < 5.13.6
Linux ≫ Linux Kernel Version3.18.134
Linux ≫ Linux Kernel Version4.20.7
Linux ≫ Linux Kernel Version5.14 Updaterc1
Linux ≫ Linux Kernel Version5.14 Updaterc2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.033 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
CWE-672 Operation on a Resource after Expiration or Release
The product uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked.