In the Linux kernel, the following vulnerability has been resolved:
can: sja1000: fix use after free in ems_pcmcia_add_card()
If the last channel is not available then "dev" is freed. Fortunately,
we can just use "pdev->irq" instead.
Also we should check if at least one channel was set up.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/1a295fea90e1acbe80c6d4940f5ff856edcd6bec - Patch | |
References | () https://git.kernel.org/stable/c/1dd5b819f7e406dc15bbc7670596ff25261aaa2a - Patch | |
References | () https://git.kernel.org/stable/c/3ec6ca6b1a8e64389f0212b5a1b0f6fed1909e45 - Patch | |
References | () https://git.kernel.org/stable/c/474f9a8534f5f89841240a7e978bafd6e1e039ce - Patch | |
References | () https://git.kernel.org/stable/c/923f4dc5df679f678e121c20bf2fd70f7bf3e288 - Patch | |
References | () https://git.kernel.org/stable/c/c8718026ba287168ff9ad0ccc4f9a413062cba36 - Patch | |
References | () https://git.kernel.org/stable/c/cbd86110546f7f730a1f5d7de56c944a336c15c4 - Patch | |
References | () https://git.kernel.org/stable/c/ccf070183e4655824936c0f96c4a2bcca93419aa - Patch |
10 Jun 2024, 18:41
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
First Time |
Linux
Linux linux Kernel |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
Summary |
|
|
References | () https://git.kernel.org/stable/c/1a295fea90e1acbe80c6d4940f5ff856edcd6bec - Patch | |
References | () https://git.kernel.org/stable/c/1dd5b819f7e406dc15bbc7670596ff25261aaa2a - Patch | |
References | () https://git.kernel.org/stable/c/3ec6ca6b1a8e64389f0212b5a1b0f6fed1909e45 - Patch | |
References | () https://git.kernel.org/stable/c/474f9a8534f5f89841240a7e978bafd6e1e039ce - Patch | |
References | () https://git.kernel.org/stable/c/923f4dc5df679f678e121c20bf2fd70f7bf3e288 - Patch | |
References | () https://git.kernel.org/stable/c/c8718026ba287168ff9ad0ccc4f9a413062cba36 - Patch | |
References | () https://git.kernel.org/stable/c/cbd86110546f7f730a1f5d7de56c944a336c15c4 - Patch | |
References | () https://git.kernel.org/stable/c/ccf070183e4655824936c0f96c4a2bcca93419aa - Patch |
24 May 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-24 15:15
Updated : 2024-11-21 06:36
NVD link : CVE-2021-47521
Mitre link : CVE-2021-47521
CVE.ORG link : CVE-2021-47521
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free