In the Linux kernel, the following vulnerability has been resolved: watchdog: Fix possible use-after-free in wdt_startup() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself.
History

Fri, 20 Dec 2024 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-05-21T14:35:37.844Z

Updated: 2025-05-04T07:08:41.321Z

Reserved: 2024-05-21T14:28:16.974Z

Link: CVE-2021-47324

cve-icon Vulnrichment

Updated: 2024-08-04T05:32:08.602Z

cve-icon NVD

Status : Analyzed

Published: 2024-05-21T15:15:19.543

Modified: 2025-04-02T14:39:35.443

Link: CVE-2021-47324

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-05-21T00:00:00Z

Links: CVE-2021-47324 - Bugzilla