{"id":"CVE-2021-47323","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()\n\nThis module's remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver's remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.","modified":"2026-03-15T22:43:11.428332Z","published":"2024-05-21T15:15:19.467Z","related":["SUSE-SU-2024:1978-1","SUSE-SU-2024:1979-1","SUSE-SU-2024:1983-1","SUSE-SU-2024:2010-1","SUSE-SU-2024:2183-1","SUSE-SU-2024:2184-1","SUSE-SU-2024:2185-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/2aef07017fae21c3d8acea9656b10e3b9c0f1e04"},{"type":"FIX","url":"https://git.kernel.org/stable/c/7c56c5508dc20a6b133bc669fc34327a6711c24c"},{"type":"FIX","url":"https://git.kernel.org/stable/c/90b7c141132244e8e49a34a4c1e445cce33e07f4"},{"type":"FIX","url":"https://git.kernel.org/stable/c/b3c41ea5bc34d8c7b19e230d80e0e555c6f5057d"},{"type":"FIX","url":"https://git.kernel.org/stable/c/522e75ed63f67e815d4ec0deace67df22d9ce78e"},{"type":"FIX","url":"https://git.kernel.org/stable/c/a173e3b62cf6dd3c4a0a10c8a82eedfcae81a566"},{"type":"FIX","url":"https://git.kernel.org/stable/c/b4565a8a2d6bffb05bfbec11399d261ec16fe373"},{"type":"FIX","url":"https://git.kernel.org/stable/c/f0feab82f6a0323f54d85e8b512a2be64f83648a"},{"type":"FIX","url":"https://git.kernel.org/stable/c/0015581a79bbf8e521f85dddb7d3e4a66b9f51d4"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.276"}]},{"events":[{"introduced":"4.5"},{"fixed":"4.9.276"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.14.240"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.198"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.134"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.52"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.12.19"}]},{"events":[{"introduced":"5.13"},{"fixed":"5.13.4"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47323.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}