CVE-2021-47357
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
21/05/2024
Last modified:
26/12/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
atm: iphase: fix possible use-after-free in ia_module_exit()<br />
<br />
This module&#39;s remove path calls del_timer(). However, that function<br />
does not wait until the timer handler finishes. This means that the<br />
timer handler may still be running after the driver&#39;s remove function<br />
has finished, which would result in a use-after-free.<br />
<br />
Fix by calling del_timer_sync(), which makes sure the timer handler<br />
has finished, and unable to re-schedule itself.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.4.276 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.5 (including) | 4.9.276 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 4.14.240 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.198 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.133 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.51 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.12.18 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.13 (including) | 5.13.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1c72e6ab66b9598cac741ed397438a52065a8f1f
- https://git.kernel.org/stable/c/89ce0b0747f319eb70f85bc820dcc43cebbd5417
- https://git.kernel.org/stable/c/9e161687855175334ca93c6c3ccb221731194479
- https://git.kernel.org/stable/c/a832ee2f2145f57443b2d565f8cb5490e8339f42
- https://git.kernel.org/stable/c/b58d246a058ae88484758cd4ab27b3180fd5ecf8
- https://git.kernel.org/stable/c/bcdd2be48edd8c6867fb44112cb8d18086beae29
- https://git.kernel.org/stable/c/c9172498d4d62c9b64e5fb37c1ee0343e65fe51b
- https://git.kernel.org/stable/c/d1fb12412874c94ad037e11d0ecdd1140a439297
- https://git.kernel.org/stable/c/e759ff76ebbbfcdcf83b6634c54dc47828573d8b
- https://git.kernel.org/stable/c/1c72e6ab66b9598cac741ed397438a52065a8f1f
- https://git.kernel.org/stable/c/89ce0b0747f319eb70f85bc820dcc43cebbd5417
- https://git.kernel.org/stable/c/9e161687855175334ca93c6c3ccb221731194479
- https://git.kernel.org/stable/c/a832ee2f2145f57443b2d565f8cb5490e8339f42
- https://git.kernel.org/stable/c/b58d246a058ae88484758cd4ab27b3180fd5ecf8
- https://git.kernel.org/stable/c/bcdd2be48edd8c6867fb44112cb8d18086beae29
- https://git.kernel.org/stable/c/c9172498d4d62c9b64e5fb37c1ee0343e65fe51b
- https://git.kernel.org/stable/c/d1fb12412874c94ad037e11d0ecdd1140a439297
- https://git.kernel.org/stable/c/e759ff76ebbbfcdcf83b6634c54dc47828573d8b



