First published: Tue May 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: can: j1939: fix Use-after-Free, hold skb ref while in use This patch fixes a Use-after-Free found by the syzbot. The problem is that a skb is taken from the per-session skb queue, without incrementing the ref count. This leads to a Use-after-Free if the skb is taken concurrently from the session queue due to a CTS.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=5.4<5.4.128 | |
Linux Kernel | >=5.5<5.10.46 | |
Linux Kernel | >=5.11<5.12.13 | |
Linux Kernel | =5.13-rc1 | |
Linux Kernel | =5.13-rc2 | |
Linux Kernel | =5.13-rc3 | |
Linux Kernel | =5.13-rc4 | |
Linux Kernel | =5.13-rc5 | |
Linux Kernel | =5.13-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47232 has been classified as a medium severity vulnerability.
To fix CVE-2021-47232, update your Linux kernel to a version that includes the patch, such as versions beyond 5.13-rc6.
CVE-2021-47232 is a Use-after-Free vulnerability in the Linux kernel.
CVE-2021-47232 affects Linux kernel versions from 5.4 to 5.13-rc6.
Yes, CVE-2021-47232 can potentially be exploited remotely, which may lead to arbitrary code execution.