{"id":"CVE-2024-47710","summary":"sock_map: Add a cond_resched() in sock_hash_free()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nsock_map: Add a cond_resched() in sock_hash_free()\n\nSeveral syzbot soft lockup reports all have in common sock_hash_free()\n\nIf a map with a large number of buckets is destroyed, we need to yield\nthe cpu when needed.","modified":"2026-04-16T00:07:06.536826280Z","published":"2024-10-21T11:53:43.420Z","related":["SUSE-SU-2024:3983-1","SUSE-SU-2024:3984-1","SUSE-SU-2024:3985-1","SUSE-SU-2024:3986-1","SUSE-SU-2024:4318-1","SUSE-SU-2024:4364-1","SUSE-SU-2024:4387-1","SUSE-SU-2025:20163-1","SUSE-SU-2025:20164-1","SUSE-SU-2025:20246-1","SUSE-SU-2025:20247-1","USN-7276-1","USN-7277-1","openSUSE-SU-2024:14500-1","openSUSE-SU-2025:14705-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47710.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/04f62c012e0e4683e572b30baf6004ca0a3f6772"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1a11a1a53255ddab8a903cdae01b9d3eb2c1a47b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/80bd490ac0a3b662a489e17d8eedeb1e905a3d40"},{"type":"WEB","url":"https://git.kernel.org/stable/c/984648aac87a6a1c8fd61663bec3f7b61eafad5e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ae8c1b3e7353ad240b829eabac7ba2584b2c6bdc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b1339be951ad31947ae19bc25cb08769bf255100"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bc05f6855642cff3c0eeb63060b35d8c4f8a851d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cd10abf41bae55c9d2b93f34a516dbf52626bcb7"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47710.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47710"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"5bed77b0a2a0e6b6bc0ae8e851cafb38ef0374df"},{"fixed":"bc05f6855642cff3c0eeb63060b35d8c4f8a851d"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"75e68e5bf2c7fa9d3e874099139df03d5952a3e1"},{"fixed":"1a11a1a53255ddab8a903cdae01b9d3eb2c1a47b"},{"fixed":"984648aac87a6a1c8fd61663bec3f7b61eafad5e"},{"fixed":"04f62c012e0e4683e572b30baf6004ca0a3f6772"},{"fixed":"80bd490ac0a3b662a489e17d8eedeb1e905a3d40"},{"fixed":"ae8c1b3e7353ad240b829eabac7ba2584b2c6bdc"},{"fixed":"cd10abf41bae55c9d2b93f34a516dbf52626bcb7"},{"fixed":"b1339be951ad31947ae19bc25cb08769bf255100"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"6fc372656a1ebed8c1ebe0011881058c02eeddc0"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47710.json"}}],"schema_version":"1.7.5"}