First published: Tue May 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: bus: mhi: pci_generic: Fix possible use-after-free in mhi_pci_remove() This driver's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.12<5.12.11 | |
Linux Kernel | =5.13-rc1 | |
Linux Kernel | =5.13-rc2 | |
Linux Kernel | =5.13-rc3 | |
Linux Kernel | =5.13-rc4 | |
Linux Kernel | =5.13-rc5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47278 has been classified with a severity rating that reflects its potential impact on system integrity.
To fix CVE-2021-47278, update the Linux kernel to a version newer than 5.12.11 or any of the 5.13 release candidates.
CVE-2021-47278 affects specific versions of the Linux kernel, including versions up to 5.12.11 and all 5.13 release candidates.
CVE-2021-47278 is not categorized as a remote exploit but can lead to local privilege escalation under certain conditions.
The potential impacts of CVE-2021-47278 include system instability and possible unauthorized actions due to a use-after-free vulnerability.