In the Linux kernel, the following vulnerability has been resolved:
can: pch_can: pch_can_rx_normal: fix use after free
After calling netif_receive_skb(skb), dereferencing skb is unsafe.
Especially, the can_frame cf which aliases skb memory is dereferenced
just after the call netif_receive_skb(skb).
Reordering the lines solves the issue.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-05-24 15:15
Updated : 2024-06-10 18:42
NVD link : CVE-2021-47520
Mitre link : CVE-2021-47520
CVE.ORG link : CVE-2021-47520
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free