First published: Fri May 24 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: can: pch_can: pch_can_rx_normal: fix use after free After calling netif_receive_skb(skb), dereferencing skb is unsafe. Especially, the can_frame cf which aliases skb memory is dereferenced just after the call netif_receive_skb(skb). Reordering the lines solves the issue.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | >=2.6.37<4.4.295 | |
Linux kernel | >=4.5<4.9.293 | |
Linux kernel | >=4.10<4.14.258 | |
Linux kernel | >=4.15<4.19.221 | |
Linux kernel | >=4.20<5.4.165 | |
Linux kernel | >=5.5<5.10.85 | |
Linux kernel | >=5.11<5.15.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47520 is classified as a medium severity vulnerability in the Linux kernel.
To fix CVE-2021-47520, you should upgrade to a version of the Linux kernel that is not affected, specifically one that is higher than the vulnerable versions listed.
CVE-2021-47520 affects multiple versions of the Linux kernel, specifically from 2.6.37 up to but not including 4.4.295, 4.5 up to but not including 4.9.293, and similar ranges for subsequent releases.
The vulnerability is caused by a use-after-free condition when dereferencing the can_frame structure right after calling netif_receive_skb.
Yes, CVE-2021-47520 is publicly known and documented in the Common Vulnerabilities and Exposures database.