{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-14T13:04:04.086","vulnerabilities":[{"cve":{"id":"CVE-2021-47073","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2024-03-01T22:15:47.060","lastModified":"2025-01-09T15:24:54.467","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios\n\ninit_dell_smbios_wmi() only registers the dell_smbios_wmi_driver on systems\nwhere the Dell WMI interface is supported. While exit_dell_smbios_wmi()\nunregisters it unconditionally, this leads to the following oops:\n\n[  175.722921] ------------[ cut here ]------------\n[  175.722925] Unexpected driver unregister!\n[  175.722939] WARNING: CPU: 1 PID: 3630 at drivers/base/driver.c:194 driver_unregister+0x38/0x40\n...\n[  175.723089] Call Trace:\n[  175.723094]  cleanup_module+0x5/0xedd [dell_smbios]\n...\n[  175.723148] ---[ end trace 064c34e1ad49509d ]---\n\nMake the unregister happen on the same condition the register happens\nto fix this."},{"lang":"es","value":"En el kernel de Linux, se resolvió la siguiente vulnerabilidad: plataforma/x86: dell-smbios-wmi: se corrigió Ups en rmmod dell_smbios init_dell_smbios_wmi() solo registra dell_smbios_wmi_driver en sistemas donde se admite la interfaz Dell WMI. Si bien exit_dell_smbios_wmi() lo cancela del registro incondicionalmente, esto genera lo siguiente: [175.722921] ------------[ cortar aquí ]------------ [ 175.722925] Inesperado ¡Dar de baja al conductor! [175.722939] ADVERTENCIA: CPU: 1 PID: 3630 en drivers/base/driver.c:194 driver_unregister+0x38/0x40... [175.723089] Seguimiento de llamadas: [175.723094] cleanup_module+0x5/0xedd [dell_smbios]... [ 175.723148] ---[ end trace 064c34e1ad49509d ]--- Haga que la cancelación del registro se realice en las mismas condiciones que el registro para solucionar este problema."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.15","versionEndExcluding":"4.19.192","matchCriteriaId":"D16B80B0-1DAC-4C57-B665-6BE9E231EDDA"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"5.4.122","matchCriteriaId":"6530C9FA-EEF8-4821-9186-47F7A1FA3C1A"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.10.40","matchCriteriaId":"69DD053C-277F-4A8C-9606-11A24F806D05"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11","versionEndExcluding":"5.12.7","matchCriteriaId":"E8F2CE30-38B0-4716-B12B-A139B0F9C5C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*","matchCriteriaId":"0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*","matchCriteriaId":"96AC23B2-D46A-49D9-8203-8E1BEDCA8532"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/0cf036a0d325200e6c27b90908e51195bbc557b1","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/3a53587423d25c87af4b4126a806a0575104b45e","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/6fa78a6b9a3beb676a010dc489c1257f7e432525","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/75cfc833da4a2111106d4c134e93e0c7f41e35e7","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/8d746ea7c687bab060a2c05a35c449302406cd52","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/0cf036a0d325200e6c27b90908e51195bbc557b1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/3a53587423d25c87af4b4126a806a0575104b45e","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/6fa78a6b9a3beb676a010dc489c1257f7e432525","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/75cfc833da4a2111106d4c134e93e0c7f41e35e7","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/8d746ea7c687bab060a2c05a35c449302406cd52","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}}]}