{"id":"CVE-2021-47295","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: fix memory leak in tcindex_partial_destroy_work\n\nSyzbot reported memory leak in tcindex_set_parms(). The problem was in\nnon-freed perfect hash in tcindex_partial_destroy_work().\n\nIn tcindex_set_parms() new tcindex_data is allocated and some fields from\nold one are copied to new one, but not the perfect hash. Since\ntcindex_partial_destroy_work() is the destroy function for old\ntcindex_data, we need to free perfect hash to avoid memory leak.","modified":"2026-03-13T05:19:25.825574Z","published":"2024-05-21T15:15:17.400Z","related":["SUSE-SU-2024:2892-1","SUSE-SU-2024:2901-1","SUSE-SU-2024:2940-1"],"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3abebc503a5148072052c229c6b04b329a420ecd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/53af9c793f644d5841d84d8e0ad83bd7ab47f3e0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7c183dc0af472dec33d2c0786a5e356baa8cad19"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7a6fb69bbcb21e9ce13bdf18c008c268874f0480"},{"type":"WEB","url":"https://git.kernel.org/stable/c/01d0d2b8b4e3cf2110baba9371c0c3d04ad5c77b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/18c3fa7a7fdbb4d21dafc8a7710ae2c1680930f6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/372ae77cf11d11fb118cbe2d37def9dd5f826abd"},{"type":"FIX","url":"https://git.kernel.org/stable/c/8d7924ce85bae64e7a67c366c7c50840f49f3a62"},{"type":"FIX","url":"https://git.kernel.org/stable/c/8e9662fde6d63c78eb1350f6167f64c9d71a865b"},{"type":"FIX","url":"https://git.kernel.org/stable/c/cac71d27745f92ee13f0ecc668ffe151a4a9c9b1"},{"type":"FIX","url":"https://git.kernel.org/stable/c/f5051bcece50140abd1a11a2d36dc3ec5484fc32"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"3.18"},{"fixed":"5.4.136"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.54"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.13.6"}]},{"events":[{"introduced":"0"},{"last_affected":"5.14-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.14-rc2"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-47295.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}