First published: Tue May 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47323 has a severity rating of medium due to the potential for a use-after-free vulnerability in the Linux kernel's watchdog module.
To fix CVE-2021-47323, users should update to the latest version of the Linux kernel where the vulnerability has been resolved.
CVE-2021-47323 affects the Linux kernel, specifically the watchdog: sc520_wdt module.
If exploited, CVE-2021-47323 could lead to a denial of service or potentially other consequences due to improper handling of timer operations.
CVE-2021-47323 was announced in late 2021 as part of ongoing security updates for the Linux kernel.