CVE-2021-47521

In the Linux kernel, the following vulnerability has been resolved: can: sja1000: fix use after free in ems_pcmcia_add_card() If the last channel is not available then "dev" is freed. Fortunately, we can just use "pdev->irq" instead. Also we should check if at least one channel was set up.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:36

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1a295fea90e1acbe80c6d4940f5ff856edcd6bec - Patch () https://git.kernel.org/stable/c/1a295fea90e1acbe80c6d4940f5ff856edcd6bec - Patch
References () https://git.kernel.org/stable/c/1dd5b819f7e406dc15bbc7670596ff25261aaa2a - Patch () https://git.kernel.org/stable/c/1dd5b819f7e406dc15bbc7670596ff25261aaa2a - Patch
References () https://git.kernel.org/stable/c/3ec6ca6b1a8e64389f0212b5a1b0f6fed1909e45 - Patch () https://git.kernel.org/stable/c/3ec6ca6b1a8e64389f0212b5a1b0f6fed1909e45 - Patch
References () https://git.kernel.org/stable/c/474f9a8534f5f89841240a7e978bafd6e1e039ce - Patch () https://git.kernel.org/stable/c/474f9a8534f5f89841240a7e978bafd6e1e039ce - Patch
References () https://git.kernel.org/stable/c/923f4dc5df679f678e121c20bf2fd70f7bf3e288 - Patch () https://git.kernel.org/stable/c/923f4dc5df679f678e121c20bf2fd70f7bf3e288 - Patch
References () https://git.kernel.org/stable/c/c8718026ba287168ff9ad0ccc4f9a413062cba36 - Patch () https://git.kernel.org/stable/c/c8718026ba287168ff9ad0ccc4f9a413062cba36 - Patch
References () https://git.kernel.org/stable/c/cbd86110546f7f730a1f5d7de56c944a336c15c4 - Patch () https://git.kernel.org/stable/c/cbd86110546f7f730a1f5d7de56c944a336c15c4 - Patch
References () https://git.kernel.org/stable/c/ccf070183e4655824936c0f96c4a2bcca93419aa - Patch () https://git.kernel.org/stable/c/ccf070183e4655824936c0f96c4a2bcca93419aa - Patch

10 Jun 2024, 18:41

Type Values Removed Values Added
CWE CWE-416
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: sja1000: arreglar el use after free en ems_pcmcia_add_card() Si el último canal no está disponible entonces se libera "dev". Afortunadamente, podemos usar "pdev->irq" en su lugar. También debemos comprobar si se configuró al menos un canal.
References () https://git.kernel.org/stable/c/1a295fea90e1acbe80c6d4940f5ff856edcd6bec - () https://git.kernel.org/stable/c/1a295fea90e1acbe80c6d4940f5ff856edcd6bec - Patch
References () https://git.kernel.org/stable/c/1dd5b819f7e406dc15bbc7670596ff25261aaa2a - () https://git.kernel.org/stable/c/1dd5b819f7e406dc15bbc7670596ff25261aaa2a - Patch
References () https://git.kernel.org/stable/c/3ec6ca6b1a8e64389f0212b5a1b0f6fed1909e45 - () https://git.kernel.org/stable/c/3ec6ca6b1a8e64389f0212b5a1b0f6fed1909e45 - Patch
References () https://git.kernel.org/stable/c/474f9a8534f5f89841240a7e978bafd6e1e039ce - () https://git.kernel.org/stable/c/474f9a8534f5f89841240a7e978bafd6e1e039ce - Patch
References () https://git.kernel.org/stable/c/923f4dc5df679f678e121c20bf2fd70f7bf3e288 - () https://git.kernel.org/stable/c/923f4dc5df679f678e121c20bf2fd70f7bf3e288 - Patch
References () https://git.kernel.org/stable/c/c8718026ba287168ff9ad0ccc4f9a413062cba36 - () https://git.kernel.org/stable/c/c8718026ba287168ff9ad0ccc4f9a413062cba36 - Patch
References () https://git.kernel.org/stable/c/cbd86110546f7f730a1f5d7de56c944a336c15c4 - () https://git.kernel.org/stable/c/cbd86110546f7f730a1f5d7de56c944a336c15c4 - Patch
References () https://git.kernel.org/stable/c/ccf070183e4655824936c0f96c4a2bcca93419aa - () https://git.kernel.org/stable/c/ccf070183e4655824936c0f96c4a2bcca93419aa - Patch

24 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-24 15:15

Updated : 2024-11-21 06:36


NVD link : CVE-2021-47521

Mitre link : CVE-2021-47521

CVE.ORG link : CVE-2021-47521


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free