Vulnerability Details : CVE-2021-47321
In the Linux kernel, the following vulnerability has been resolved:
watchdog: Fix possible use-after-free by calling del_timer_sync()
This driver's remove path calls del_timer(). However, that function
does not wait until the timer handler finishes. This means that the
timer handler may still be running after the driver's remove function
has finished, which would result in a use-after-free.
Fix by calling del_timer_sync(), which makes sure the timer handler
has finished, and unable to re-schedule itself.
Vulnerability category: Memory Corruption
Products affected by CVE-2021-47321
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-47321
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 5 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-47321
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | 2024-12-26 |
CWE ids for CVE-2021-47321
-
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-47321
-
https://git.kernel.org/stable/c/d0212f095ab56672f6f36aabc605bda205e1e0bf
watchdog: Fix possible use-after-free by calling del_timer_sync() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/66ba9cf929b1c4fabf545bd4c18f6f64e23e46e4
watchdog: Fix possible use-after-free by calling del_timer_sync() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/db222f1477ad5692cd454709b714949807e5d111
watchdog: Fix possible use-after-free by calling del_timer_sync() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/4c05dac488a660fe2925c047ecb119e7afaaeb1e
watchdog: Fix possible use-after-free by calling del_timer_sync() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/8bec568d7518b1504a602ed5376bb322e4dbb270
watchdog: Fix possible use-after-free by calling del_timer_sync() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/1a053c4d716898a53c2e31c574a70ea0c37044a3
watchdog: Fix possible use-after-free by calling del_timer_sync() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/ca96b8ea5e74956071154bdb456778cc3027e79f
watchdog: Fix possible use-after-free by calling del_timer_sync() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/58606882ad8ec6c39e0f40344b922921ef94ab4d
watchdog: Fix possible use-after-free by calling del_timer_sync() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/ecd620e0fb1ff7f78fdb593379b2e6938c99707a
watchdog: Fix possible use-after-free by calling del_timer_sync() - kernel/git/stable/linux.git - Linux kernel stable treePatch
Jump to