Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-47323

Опубликовано: 21 мая 2024
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself.

A vulnerability was found in the wdt_turnoff() function in the Linux kernel's watchdog module. This issue arises when the module's remove process calls del_timer(), which does not wait for the timer handler to finish. Consequently, the handler may still be running after the driver is removed, leading to a potential use-after-free issue.

Отчет

This vulnerability is rated as a moderate severity because this issue can cause system instability and crashes, as the use-after-free situation may disrupt normal operations.

Меры по смягчению последствий

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 9kernel-rtNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=2282438kernel: watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()

EPSS

Процентиль: 34%
0.00134
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself.

CVSS3: 8.8
nvd
больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself.

CVSS3: 8.8
msrc
5 месяцев назад

watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()

CVSS3: 8.8
debian
больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: w ...

CVSS3: 8.8
github
больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself.

EPSS

Процентиль: 34%
0.00134
Низкий

5.5 Medium

CVSS3

Уязвимость CVE-2021-47323