Количество 13
Количество 13
CVE-2021-47323
In the Linux kernel, the following vulnerability has been resolved: watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself.
CVE-2021-47323
In the Linux kernel, the following vulnerability has been resolved: watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself.
CVE-2021-47323
In the Linux kernel, the following vulnerability has been resolved: watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself.
CVE-2021-47323
watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()
CVE-2021-47323
In the Linux kernel, the following vulnerability has been resolved: w ...
GHSA-cm35-f8g3-r786
In the Linux kernel, the following vulnerability has been resolved: watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself.
BDU:2025-07308
Уязвимость функции wdt_startup() модуля drivers/watchdog/sc520_wdt.c поддержки сторожевого таймера ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
SUSE-SU-2024:1978-1
Security update for the Linux Kernel
SUSE-SU-2024:2183-1
Security update for the Linux Kernel
SUSE-SU-2024:1979-1
Security update for the Linux Kernel
SUSE-SU-2024:2185-1
Security update for the Linux Kernel
SUSE-SU-2024:2184-1
Security update for the Linux Kernel
SUSE-SU-2024:1983-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-47323 In the Linux kernel, the following vulnerability has been resolved: watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself. | CVSS3: 8.8 | 0% Низкий | больше 1 года назад | |
CVE-2021-47323 In the Linux kernel, the following vulnerability has been resolved: watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
CVE-2021-47323 In the Linux kernel, the following vulnerability has been resolved: watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself. | CVSS3: 8.8 | 0% Низкий | больше 1 года назад | |
CVE-2021-47323 watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() | CVSS3: 8.8 | 0% Низкий | 5 месяцев назад | |
CVE-2021-47323 In the Linux kernel, the following vulnerability has been resolved: w ... | CVSS3: 8.8 | 0% Низкий | больше 1 года назад | |
GHSA-cm35-f8g3-r786 In the Linux kernel, the following vulnerability has been resolved: watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself. | CVSS3: 8.8 | 0% Низкий | больше 1 года назад | |
BDU:2025-07308 Уязвимость функции wdt_startup() модуля drivers/watchdog/sc520_wdt.c поддержки сторожевого таймера ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 8.8 | 0% Низкий | больше 4 лет назад | |
SUSE-SU-2024:1978-1 Security update for the Linux Kernel | больше 1 года назад | |||
SUSE-SU-2024:2183-1 Security update for the Linux Kernel | больше 1 года назад | |||
SUSE-SU-2024:1979-1 Security update for the Linux Kernel | больше 1 года назад | |||
SUSE-SU-2024:2185-1 Security update for the Linux Kernel | больше 1 года назад | |||
SUSE-SU-2024:2184-1 Security update for the Linux Kernel | больше 1 года назад | |||
SUSE-SU-2024:1983-1 Security update for the Linux Kernel | больше 1 года назад |
Уязвимостей на страницу