Vulnerability Details : CVE-2021-47357
In the Linux kernel, the following vulnerability has been resolved:
atm: iphase: fix possible use-after-free in ia_module_exit()
This module's remove path calls del_timer(). However, that function
does not wait until the timer handler finishes. This means that the
timer handler may still be running after the driver's remove function
has finished, which would result in a use-after-free.
Fix by calling del_timer_sync(), which makes sure the timer handler
has finished, and unable to re-schedule itself.
Vulnerability category: Memory Corruption
Products affected by CVE-2021-47357
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-47357
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 8 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-47357
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | 2024-12-26 |
CWE ids for CVE-2021-47357
-
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-47357
-
https://git.kernel.org/stable/c/9e161687855175334ca93c6c3ccb221731194479
atm: iphase: fix possible use-after-free in ia_module_exit() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/d1fb12412874c94ad037e11d0ecdd1140a439297
atm: iphase: fix possible use-after-free in ia_module_exit() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/c9172498d4d62c9b64e5fb37c1ee0343e65fe51b
atm: iphase: fix possible use-after-free in ia_module_exit() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/a832ee2f2145f57443b2d565f8cb5490e8339f42
atm: iphase: fix possible use-after-free in ia_module_exit() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/1c72e6ab66b9598cac741ed397438a52065a8f1f
atm: iphase: fix possible use-after-free in ia_module_exit() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/bcdd2be48edd8c6867fb44112cb8d18086beae29
atm: iphase: fix possible use-after-free in ia_module_exit() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/b58d246a058ae88484758cd4ab27b3180fd5ecf8
atm: iphase: fix possible use-after-free in ia_module_exit() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/89ce0b0747f319eb70f85bc820dcc43cebbd5417
atm: iphase: fix possible use-after-free in ia_module_exit() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/e759ff76ebbbfcdcf83b6634c54dc47828573d8b
atm: iphase: fix possible use-after-free in ia_module_exit() - kernel/git/stable/linux.git - Linux kernel stable treePatch
Jump to