First published: Tue May 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: atm: nicstar: Fix possible use-after-free in nicstar_cleanup() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <4.4.276 | |
Linux Kernel | >=4.5<4.9.276 | |
Linux Kernel | >=4.10<4.14.240 | |
Linux Kernel | >=4.15<4.19.198 | |
Linux Kernel | >=4.20<5.4.133 | |
Linux Kernel | >=5.5<5.10.51 | |
Linux Kernel | >=5.11<5.12.18 | |
Linux Kernel | >=5.13<5.13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47355 has been classified with a medium severity level.
To fix CVE-2021-47355, upgrade the Linux kernel to a version that has addressed this vulnerability.
The impact of CVE-2021-47355 can include potential use-after-free conditions, leading to system instability or exploitation.
CVE-2021-47355 affects multiple versions of the Linux kernel ranging from 4.4 to versions prior to 5.13.
Yes, CVE-2021-47355 is a publicly known vulnerability in the Linux kernel.