Skip to main content

CVE-2021-47323: Vulnerability in Linux Linux

High
VulnerabilityCVE-2021-47323cvecve-2021-47323
Published: Tue May 21 2024 (05/21/2024, 14:35:37 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself.

AI-Powered Analysis

AILast updated: 07/03/2025, 06:10:43 UTC

Technical Analysis

CVE-2021-47323 is a high-severity vulnerability in the Linux kernel's watchdog driver, specifically the sc520_wdt module. The issue arises from improper handling of timer deletion during the driver's removal process. The vulnerable code calls del_timer() to remove a timer, but this function does not wait for the timer handler to finish executing. Consequently, the timer handler may still be running after the driver's remove function completes, leading to a use-after-free (CWE-416) condition. This can cause memory corruption, potentially allowing an attacker with limited privileges to execute arbitrary code with kernel-level permissions or cause a denial of service by crashing the system. The fix involves replacing del_timer() with del_timer_sync(), which blocks until the timer handler has fully completed and prevents it from rescheduling itself, thereby eliminating the race condition. The vulnerability affects Linux kernel versions identified by the given commit hash and was published on May 21, 2024. The CVSS v3.1 score is 8.8, indicating a high severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability. No known exploits are currently reported in the wild. This vulnerability is critical for systems running the affected Linux kernel versions with the sc520_wdt watchdog driver enabled, which is common in embedded and industrial devices. Attackers with local privileges could exploit this flaw to escalate privileges or disrupt system stability.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to sectors relying on Linux-based embedded systems, industrial control systems, and servers using the affected kernel versions. The potential for privilege escalation and system crashes could lead to operational disruptions, data breaches, and loss of service availability. Critical infrastructure operators, manufacturing plants, telecommunications providers, and cloud service providers in Europe that deploy Linux kernels with the sc520_wdt module are particularly vulnerable. Exploitation could enable attackers to gain kernel-level control, bypass security controls, and persist within systems, thereby increasing the risk of espionage, sabotage, or ransomware attacks. The impact extends to confidentiality, integrity, and availability of systems, potentially affecting sensitive data and critical services. Given the high CVSS score and the nature of the vulnerability, European organizations must prioritize patching to prevent exploitation, especially since the vulnerability requires local privileges but no user interaction, making it feasible for insider threats or attackers who have already gained limited access.

Mitigation Recommendations

European organizations should immediately identify Linux systems running affected kernel versions with the sc520_wdt watchdog driver enabled. Specific mitigation steps include: 1) Applying the official Linux kernel patch that replaces del_timer() with del_timer_sync() in the sc520_wdt driver to ensure safe timer deletion. 2) For systems where patching is not immediately possible, consider disabling the sc520_wdt watchdog module if it is not critical to operations, to reduce attack surface. 3) Implement strict access controls and monitoring to limit local user privileges and detect suspicious activities indicative of exploitation attempts. 4) Employ kernel integrity monitoring and runtime security tools to detect anomalous behavior related to use-after-free conditions. 5) Coordinate with hardware and embedded device vendors to obtain updated firmware or kernel versions incorporating the fix. 6) Conduct thorough testing of patches in staging environments to ensure stability before deployment. 7) Maintain up-to-date inventory of Linux kernel versions and modules in use to facilitate rapid response to vulnerabilities. These measures go beyond generic advice by focusing on the specific driver and kernel function involved, emphasizing privilege restriction and module management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-21T14:28:16.974Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9835c4522896dcbea44a

Added to database: 5/21/2025, 9:09:09 AM

Last enriched: 7/3/2025, 6:10:43 AM

Last updated: 8/15/2025, 11:38:58 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats