CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
13.0%
In the Linux kernel, the following vulnerability has been resolved:
watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() This
module’s remove path calls del_timer(). However, that function does not
wait until the timer handler finishes. This means that the timer handler
may still be running after the driver’s remove function has finished, which
would result in a use-after-free. Fix by calling del_timer_sync(), which
makes sure the timer handler has finished, and unable to re-schedule
itself.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws-hwe | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure-4.15 | < any | UNKNOWN |
git.kernel.org/linus/90b7c141132244e8e49a34a4c1e445cce33e07f4 (5.14-rc1)
git.kernel.org/stable/c/0015581a79bbf8e521f85dddb7d3e4a66b9f51d4
git.kernel.org/stable/c/2aef07017fae21c3d8acea9656b10e3b9c0f1e04
git.kernel.org/stable/c/522e75ed63f67e815d4ec0deace67df22d9ce78e
git.kernel.org/stable/c/7c56c5508dc20a6b133bc669fc34327a6711c24c
git.kernel.org/stable/c/90b7c141132244e8e49a34a4c1e445cce33e07f4
git.kernel.org/stable/c/a173e3b62cf6dd3c4a0a10c8a82eedfcae81a566
git.kernel.org/stable/c/b3c41ea5bc34d8c7b19e230d80e0e555c6f5057d
git.kernel.org/stable/c/b4565a8a2d6bffb05bfbec11399d261ec16fe373
git.kernel.org/stable/c/f0feab82f6a0323f54d85e8b512a2be64f83648a
launchpad.net/bugs/cve/CVE-2021-47323
nvd.nist.gov/vuln/detail/CVE-2021-47323
security-tracker.debian.org/tracker/CVE-2021-47323
www.cve.org/CVERecord?id=CVE-2021-47323