Vulnerability Details : CVE-2021-47520
In the Linux kernel, the following vulnerability has been resolved:
can: pch_can: pch_can_rx_normal: fix use after free
After calling netif_receive_skb(skb), dereferencing skb is unsafe.
Especially, the can_frame cf which aliases skb memory is dereferenced
just after the call netif_receive_skb(skb).
Reordering the lines solves the issue.
Vulnerability category: Memory Corruption
Products affected by CVE-2021-47520
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-47520
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 12 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-47520
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | 2024-06-10 |
CWE ids for CVE-2021-47520
-
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-47520
-
https://git.kernel.org/stable/c/703dde112021c93d6e89443c070e7dbd4dea612e
can: pch_can: pch_can_rx_normal: fix use after free - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/94cddf1e9227a171b27292509d59691819c458db
can: pch_can: pch_can_rx_normal: fix use after free - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/3e193ef4e0a3f5bf92ede83ef214cb09d01b00aa
can: pch_can: pch_can_rx_normal: fix use after free - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/abb4eff3dcd2e583060082a18a8dbf31f02689d4
can: pch_can: pch_can_rx_normal: fix use after free - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/3a3c46e2eff0577454860a203be1a8295f4acb76
can: pch_can: pch_can_rx_normal: fix use after free - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/bafe343a885c70dddf358379cf0b2a1c07355d8d
can: pch_can: pch_can_rx_normal: fix use after free - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/affbad02bf80380a7403885b9fe4a1587d1bb4f3
can: pch_can: pch_can_rx_normal: fix use after free - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/6c73fc931658d8cbc8a1714b326cb31eb71d16a7
can: pch_can: pch_can_rx_normal: fix use after free - kernel/git/stable/linux.git - Linux kernel stable treePatch
Jump to