CVE-2021-47520

In the Linux kernel, the following vulnerability has been resolved: can: pch_can: pch_can_rx_normal: fix use after free After calling netif_receive_skb(skb), dereferencing skb is unsafe. Especially, the can_frame cf which aliases skb memory is dereferenced just after the call netif_receive_skb(skb). Reordering the lines solves the issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:36

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/3a3c46e2eff0577454860a203be1a8295f4acb76 - Patch () https://git.kernel.org/stable/c/3a3c46e2eff0577454860a203be1a8295f4acb76 - Patch
References () https://git.kernel.org/stable/c/3e193ef4e0a3f5bf92ede83ef214cb09d01b00aa - Patch () https://git.kernel.org/stable/c/3e193ef4e0a3f5bf92ede83ef214cb09d01b00aa - Patch
References () https://git.kernel.org/stable/c/6c73fc931658d8cbc8a1714b326cb31eb71d16a7 - Patch () https://git.kernel.org/stable/c/6c73fc931658d8cbc8a1714b326cb31eb71d16a7 - Patch
References () https://git.kernel.org/stable/c/703dde112021c93d6e89443c070e7dbd4dea612e - Patch () https://git.kernel.org/stable/c/703dde112021c93d6e89443c070e7dbd4dea612e - Patch
References () https://git.kernel.org/stable/c/94cddf1e9227a171b27292509d59691819c458db - Patch () https://git.kernel.org/stable/c/94cddf1e9227a171b27292509d59691819c458db - Patch
References () https://git.kernel.org/stable/c/abb4eff3dcd2e583060082a18a8dbf31f02689d4 - Patch () https://git.kernel.org/stable/c/abb4eff3dcd2e583060082a18a8dbf31f02689d4 - Patch
References () https://git.kernel.org/stable/c/affbad02bf80380a7403885b9fe4a1587d1bb4f3 - Patch () https://git.kernel.org/stable/c/affbad02bf80380a7403885b9fe4a1587d1bb4f3 - Patch
References () https://git.kernel.org/stable/c/bafe343a885c70dddf358379cf0b2a1c07355d8d - Patch () https://git.kernel.org/stable/c/bafe343a885c70dddf358379cf0b2a1c07355d8d - Patch

10 Jun 2024, 18:42

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/3a3c46e2eff0577454860a203be1a8295f4acb76 - () https://git.kernel.org/stable/c/3a3c46e2eff0577454860a203be1a8295f4acb76 - Patch
References () https://git.kernel.org/stable/c/3e193ef4e0a3f5bf92ede83ef214cb09d01b00aa - () https://git.kernel.org/stable/c/3e193ef4e0a3f5bf92ede83ef214cb09d01b00aa - Patch
References () https://git.kernel.org/stable/c/6c73fc931658d8cbc8a1714b326cb31eb71d16a7 - () https://git.kernel.org/stable/c/6c73fc931658d8cbc8a1714b326cb31eb71d16a7 - Patch
References () https://git.kernel.org/stable/c/703dde112021c93d6e89443c070e7dbd4dea612e - () https://git.kernel.org/stable/c/703dde112021c93d6e89443c070e7dbd4dea612e - Patch
References () https://git.kernel.org/stable/c/94cddf1e9227a171b27292509d59691819c458db - () https://git.kernel.org/stable/c/94cddf1e9227a171b27292509d59691819c458db - Patch
References () https://git.kernel.org/stable/c/abb4eff3dcd2e583060082a18a8dbf31f02689d4 - () https://git.kernel.org/stable/c/abb4eff3dcd2e583060082a18a8dbf31f02689d4 - Patch
References () https://git.kernel.org/stable/c/affbad02bf80380a7403885b9fe4a1587d1bb4f3 - () https://git.kernel.org/stable/c/affbad02bf80380a7403885b9fe4a1587d1bb4f3 - Patch
References () https://git.kernel.org/stable/c/bafe343a885c70dddf358379cf0b2a1c07355d8d - () https://git.kernel.org/stable/c/bafe343a885c70dddf358379cf0b2a1c07355d8d - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: pch_can: pch_can_rx_normal: corregir el use after free después de llamar a netif_receive_skb(skb), desreferenciar skb no es seguro. Especialmente, el can_frame cf que alias la memoria skb se desreferencia justo después de la llamada netif_receive_skb(skb). Reordenar las líneas resuelve el problema.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-416
First Time Linux
Linux linux Kernel

24 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-24 15:15

Updated : 2024-11-21 06:36


NVD link : CVE-2021-47520

Mitre link : CVE-2021-47520

CVE.ORG link : CVE-2021-47520


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free