First published: Tue May 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: atm: iphase: fix possible use-after-free in ia_module_exit() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <4.4.276 | |
Linux Kernel | >=4.5<4.9.276 | |
Linux Kernel | >=4.10<4.14.240 | |
Linux Kernel | >=4.15<4.19.198 | |
Linux Kernel | >=4.20<5.4.133 | |
Linux Kernel | >=5.5<5.10.51 | |
Linux Kernel | >=5.11<5.12.18 | |
Linux Kernel | >=5.13<5.13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47357 has a medium severity rating due to its potential effect on system stability.
To resolve CVE-2021-47357, update to a version of the Linux kernel that is patched beyond the affected versions.
CVE-2021-47357 affects Linux kernel versions prior to 4.4.276 and versions between 4.5 to 5.13.3.
CVE-2021-47357 is caused by a use-after-free condition arising from the improper handling of timer deletion during module exit.
CVE-2021-47357 does not appear to have direct remote exploitability as it involves local kernel operations.